IT Systems  >   Business Systems  >   Security Systems  >  

Intrusion Prevention Systems

RSS Feed   
ALSO CALLED: IPS
DEFINITION: An intrusion prevention system is any device which exercises access control to protect computers from exploitation. Intrusion prevention technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall.
Intrusion Prevention Systems Reports
26 - 50 of 117 Matches Previous Page  |  Next Page
Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


Access & Protect Your Data – Anywhere, Anytime
sponsored by TITUS
WHITE PAPER: The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
WHITE PAPER: Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER: As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

Pillars of Protection: A New View of Enterprise Security
sponsored by Oracle Corporation
WHITE PAPER: Organizations today need to be protected at every layer – in the data center and in the cloud. Read on to learn how you can defend your business with the 3 pillars of protection.
Posted: 04 Apr 2019 | Published: 31 Jul 2018

Oracle Corporation

How to Get Started with the NIST Cybersecurity Framework
sponsored by Expel
WHITE PAPER: The NIST Cybersecurity Framework can be very useful to help companies understand where they are and where they are going as they grow their broader cyber risk management program. In this white paper, Expel shares how using their Expel service has helped their CSF scores. Also learn how Expel can help you on the road to CSF nirvana.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Expel

Evaluating Endpoint Protection Platforms
sponsored by CrowdStrike
RESEARCH CONTENT: Endpoint protection is evolving to address more of Gartner's adaptive security architecture tasks such as hardening, investigation, incident detection, and incident response. In this research report, explore Gartner's magic quadrant which includes top vendors along with strengths and cautions for each.
Posted: 27 Mar 2019 | Published: 24 Jan 2018

CrowdStrike

Endpoint Detection and Response
sponsored by CrowdStrike
RESEARCH CONTENT: This Forrester Wave report evaluates Endpoint Detection and Response (EDR) providers. It also shows how different provides measure up and includes key takeaways from the research. Download the report, to discover the top 12 vendors based on a 20-criteria evaluation.
Posted: 27 Mar 2019 | Published: 05 Jul 2018

CrowdStrike

The Essential Guide To Fraud
sponsored by Splunk
WHITE PAPER: Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

The SIEM Buyer's Guide
sponsored by Splunk
WHITE PAPER: Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

4 Reasons to Add UBA to Your SIEM
sponsored by Splunk
WHITE PAPER: To combat threats, organizations traditionally have turned to SIEMs. However, more sophisticated use cases require a machine learning-powered solution. This is where user and entity behavior analytics (UEBA) can prove to be an invaluable addition to your SIEM. In this white paper, learn about 4 reasons to add UEBA to your SIEM.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

9 Key Questions to Ask When Selecting an Incident Response Service Provider
sponsored by Dell SecureWorks
WHITE PAPER: Many people associate the term "incident response" with recovery efforts following a major security breach. However, effective incident response is not just reactive, nor is it confined to major incidents. In this white paper, learn how an incident response provider can assist you with a range of prevention, detection, and response activities.
Posted: 08 Feb 2019 | Published: 08 Feb 2019

Dell SecureWorks

5 Top Recommendations for Effective Threat Detection
sponsored by Alert Logic
RESOURCE: If your organization is looking to improve the effectiveness of your threat detection program, uncover the top 5 recommendations for effective threat detection, today.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Alert Logic

Active defence through deceptive IPS
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway security series explains how intrusion prevention systems (IPS) can be used with a 'honeynet' to gather intelligence on cyber attacks
Posted: 05 Jun 2017 | Published: 05 Jun 2017

ComputerWeekly.com

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM

Intrusion Detection and Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Intrusion Detection and Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Intrusion Detection and Protection: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

SearchSecurity.com

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos

Five critical steps to achieving an effective application security program
sponsored by IBM
WHITE PAPER: This white paper explains a variety of application threats that organisations deal with, and introduces 5 practical steps to take when implementing application security.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

IBM

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
sponsored by Hewlett Packard Enterprise
CASE STUDY: This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
Posted: 29 May 2014 | Published: 31 May 2012

Hewlett Packard Enterprise
26 - 50 of 117 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info