IT Systems  >   Business Systems  >   Security Systems  >  

Intrusion Prevention Systems

RSS Feed   
ALSO CALLED: IPS
DEFINITION: An intrusion prevention system is any device which exercises access control to protect computers from exploitation. Intrusion prevention technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall.
Intrusion Prevention Systems Reports
51 - 75 of 159 Matches Previous Page  |  Next Page
Cybersecurity Evolved: The Sophos Business Impact
sponsored by Sophos
CASE STUDY: Improvements to cybersecurity often rely on an increase in IT resources, which most organizations are unable to fulfill. This collection of 5 Sophos customer success stories illustrates how organizations may be able to strengthen threat protection and efficiency without adding headcount. Read on to discover how.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Sophos

The Rise of Enterprise Ransomware
sponsored by Sophos
WHITE PAPER: Ransomware attacks have recently seen a pattern shift towards larger enterprises – but why? This white paper further examines the ransomware threat landscape, including key threats to keep an eye on and critical security technologies organizations should include to protect themselves.
Posted: 23 Jun 2020 | Published: 23 Jun 2020

Sophos

The Synack Value
sponsored by Synack
DATA SHEET: As business environments become more complex, traditional penetration testing becomes unable to protect against today’s threats. To address this issue, Synack developed a ‘smart’ penetration testing platform, which combines crowdsourced human talent with AI. Download this data sheet to learn more and see how it compares to traditional pen testing.
Posted: 22 May 2020 | Published: 22 May 2020

Synack

Runtime Memory Analysis: A Better Way Forward for Vulnerability Management
sponsored by Rezilion
WHITE PAPER: According to the IDC, large-to-very large enterprises spend 7-10% of their security budget on vulnerability management. However, firms with strong security are equally breached by known vulnerabilities as those with poor security posture. So, what is the best way to approach vulnerability prioritization? Download this white paper to find out.
Posted: 22 May 2020 | Published: 22 May 2020

Rezilion

HOW TO COMBAT Ransomware
sponsored by VMware International Unlimited Company
WHITE PAPER: Ransomware is a rapidly growing and increasingly disruptive form of malware. In fact, it’s estimated that a ransomware attack strikes every 14 seconds or so. In this edition of Global Threats by VMware Carbon Black, explore and dissect what defines a ransomware attack, how they work, and best practices for mitigating them.
Posted: 15 May 2020 | Published: 15 May 2020

VMware International Unlimited Company

Magic Quadrant for Security Information and Event Management
sponsored by IBM
RESOURCE: Growing in usage, security information and incident response (SIEM) capabilities enable organizations to aggregate and process event data across their network to detect and respond to incidents at greater speed. This Gartner Magic Quadrant report overviews and analyzes key SIEM vendors as well as their offerings. Read on to view the results.
Posted: 14 May 2020 | Published: 05 Mar 2020

IBM

2019 CrowdStrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: Each year, CrowdStrike conducts a Global Security Attitude Survey to better understand the current state of incident detection and response. The industry ideal is set at the 1-10-60 rule: 1 minute to detect, 10 minutes to understand, and 60 minutes to contain. Read the research results and see how close organizations came to this benchmark.
Posted: 14 May 2020 | Published: 14 May 2020

CrowdStrike

Implications of MITRE ATT&CK for Security Teams
sponsored by BlueVoyant
EBOOK: The MITRE ATT&CK framework is a global knowledge hub of observed cyberattack methods and tactics, designed to enable security teams with key insights for detecting and responding to an incident. This e-book offers an overview of the MITRE ATT&CK framework, its history and the implications for security teams. Read on to get started.
Posted: 11 May 2020 | Published: 11 May 2020

BlueVoyant

How to Combat Island Hopping
sponsored by VMware International Unlimited Company
WHITE PAPER: Island hopping is a cyberattack strategy in which a hacker targets a smaller organization in order to leverage their affiliation with larger organizations as a point of entry for an attack. This white paper takes a closer look at island hopping tactics and methods for identifying and mitigating them. Read on to learn more.
Posted: 08 May 2020 | Published: 08 May 2020

VMware International Unlimited Company

Building a High-Speed SOC
sponsored by VMware International Unlimited Company
WHITE PAPER: 87% of organizations today feel it’s difficult to recruit and hire cybersecurity talent. The effects of this skills gap are obvious: security teams will be unable to keep pace with the growing volume of threats. In this white paper, discover how the right balance of skilled workers, processes and technology can produce an effective SOC.
Posted: 07 May 2020 | Published: 07 May 2020

VMware International Unlimited Company

YARA-L: A New Detection Language for Modern Threats
sponsored by Chronicle
WHITE PAPER: When it comes to threat detection and incident investigation, most organizations turn to SIEM, SOAR or another similar approach for analyzing security data. However, analyzing data is made more challenging by the increasing amount being generated. In this white paper, learn more about YARA-L, a new detection language for analyzing threat data.
Posted: 07 May 2020 | Published: 07 May 2020

Chronicle

Hunt Like a Pro: A Threat Hunting Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: Threat hunting is a proactive process of scanning the network for potential threats, isolating them and thwarting the malicious behavior before it gets a chance to spread. The goal is to tilt the advantage from the attacker back to the defender. Read this white paper to uncover the best practices necessary to get started hunting threats.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

VMware Carbon Black Cloud Enterprise EDR
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: In this datasheet, explore the key features and capabilities of VMware Carbon Black Enterprise EDR, designed to deliver continuous visibility for top security operations centers (SOCs) and incident response (IR) teams as they hunt for threats.
Posted: 28 Apr 2020 | Published: 28 Apr 2020

VMware International Unlimited Company

VMware Carbon Black Cloud Managed Detection Monitoring and Alert Triage
sponsored by VMware International Unlimited Company
PRODUCT OVERVIEW: Today’s security teams are often understaffed and spend too much of their time on tedious, manual tasks. This prevents them from tending to other security areas and slows threat response. In this data sheet, explore VMware Carbon Black Cloud Managed Detection, designed to help by automating some of these tasks. Read on to learn more.
Posted: 27 Apr 2020 | Published: 27 Apr 2020

VMware International Unlimited Company

Catch intruders in minutes, not months
sponsored by CI Security
PRODUCT OVERVIEW: As cyberattacks continue to increase in volume and complexity, organizations are turning to security service providers for managed detection and response (MDR) capabilities. This white paper highlights the key features of Critical Insight Managed Detection & Response (MDR) and provides a breakdown of use cases across several industries.
Posted: 23 Apr 2020 | Published: 23 Apr 2020

CI Security

The Right Roles for SIEM and EDR
sponsored by Cybereason
WHITE PAPER: While most organizations recognize the need for security incident response and threat hunting, many are uncertain how to go about configuring a setup that meets their needs. In this white paper, explore the and benefits of configuring SIEM technologies with new tools like EDR and SOAR.
Posted: 21 Apr 2020 | Published: 22 Apr 2019

Cybereason

Advantage, Network Metadata: How to Enhance Efficiency in Incident Investigations Without PCAP
sponsored by Gigamon
WHITE PAPER: For a long time network security teams have relied on using packet captures (PCAPs) as the go-to approach for incident investigation. Yet, PCAP can be slow, labor intensive and inefficient. Read this new technology brief and discover how to enhance investigation efficiency without using PCAP by leveraging the advantages of metadata capture.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

Gigamon

Next-Gen Intrusion Detection: Complementing Perimeter Protection to Secure the Virtual Attack Surface
sponsored by Accedian
WHITE PAPER: Learn about next-gen IDS technology and how it adds another layer of protection to the enterprise SecOps arsenal to not only protect against illicit network intrusions and behaviors, but to implement active measures to catch cybercriminals in the act.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

Accedian

How to Budget for Managed Detection and Response: A 6-step Guide for IT Security
sponsored by CI Security
WHITE PAPER: As a security leader, one of the biggest challenges is acquiring adequate security tools while staying under budget. Too often, sacrifices are made, leading to potential security gaps. This guide highlights 6 steps you should take when crafting a budget proposal for acquiring a managed detection & response tool Read on to get started.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

CI Security

Why Behavior-Based Network Traffic Analysis (NTA) Matters
sponsored by IronNet
WHITE PAPER: Today’s security executives are looking to shore up their defenses with a more proactive approach — one that can signal unknown threats steps ahead of the impact. Behavioral analytics adds that level of sophistication to network traffic analysis (NTA). Learn how NTA can elevate your threat detection strategy overall.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

IronNet

2019 Crowdstrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: In today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.
Posted: 21 Feb 2020 | Published: 15 Nov 2019

CrowdStrike

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 28 Oct 2019 | Published: 23 Oct 2019

ServiceNow

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

ServiceNow

How to Improve Your Security Incident Response Process
sponsored by ServiceNow
EGUIDE: Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.
Posted: 24 Oct 2019 | Published: 24 Oct 2019

ServiceNow

A Look Inside Financially Motivated Attacks and the Active FIN8 Threat Group
sponsored by Gigamon
ANALYST REPORT: Download this report to explore a detailed view into the inner workings of financially motivated threat actor groups, including their preferred tactics and tools. Gaining an understanding of the anatomy of these attacks can help your team to improve visibility into the threats and expedite rapid detection and response.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Gigamon
51 - 75 of 159 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info