IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed   
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. To implement Diffie-Hellman, the two end users Alice and Bob, while communicating over a channel  … 

Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Prevention Reports
1 - 25 of 181 Matches Previous Page  |  Next Page
How Machine Learning Can Help You Keep up with Current Threats
sponsored by Dell SecureWorks
EGUIDE: Although organizations are spending billions of dollars on cybersecurity products, cyberattacks are continuing to be successful. This means that their tools need to be updated. In this e-guide, learn how AI and ML can help to improve your cybersecurity tools and processes.
Posted: 30 Sep 2019 | Published: 25 Sep 2019

Dell SecureWorks

Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System
sponsored by Claroty
WHITE PAPER: A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

Claroty

2019 Market Guide for Security Orchestration, Automation and Response Solutions
sponsored by IBM
ANALYST REPORT: The first market guide from Gartner to cover the SOAR solution market provides analysis and direction on the current state of the SOAR market, as well as recommendations and key findings to help security and risk management leaders evaluate how a SOAR solution can improve their security operations.
Posted: 25 Sep 2019 | Published: 27 Jun 2019

IBM

Make Sure Your Organization is Mature Enough for SOAR
sponsored by IBM
ANALYST REPORT: A SOAR platform is a valuable tool for organizations who have made appropriate investments in their security operations processes. This recent research from Gartner looks at the necessary preparations that security leaders need to make so that the deployment of a SOAR solution will improve the efficiency of their incident response.
Posted: 25 Sep 2019 | Published: 27 Mar 2019

IBM

Why Should I Care About SSL/TLS Decryption?
sponsored by Gigamon
WEBCAST: On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. In this webcast, Druce McFarlane, Director of Product Management at Gigamon, discusses how TLS/SSL encryption has become a threat vector, and how to make sure your detection tools are working at their greatest capacity.
Posted: 24 Sep 2019 | Premiered: Sep 24, 2019

Gigamon

The State of Detection Report 2019
sponsored by Fidelis
ANALYST REPORT: Cybersecurity hasn't gotten any easier. That should hardly be a revelation to security professionals in the field, who every year are seeing their cyber terrain grow larger and larger. In The State of Threat Detection Report 2019, explore Fidelis' findings from a survey of 300 cybersecurity professional on key cybersecurity challenges.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Fidelis

Fidelis Deception Demo
sponsored by Fidelis
WEBCAST: Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

Webinar: Pages from the Playbook – Building the MITRE ATT&CK™ Framework into your Incident Response
sponsored by IBM
WEBCAST: In this session, Craig Roberts, Solutions Architect at IBM Security, will explain Resilient's approach to ATT&CK and demonstrate how it can be used to investigate and remediate a security incident in coordination with QRadar, the Hybrid Analysis sandbox from CrowdStrike and the MISP threat intelligence platform.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

IBM

The First 72-Hours: How to Approach the Initial Hours of a Security Incident
sponsored by Fidelis
WHITE PAPER: Over the course of responding to thousands of critical security incidents, Fidelis Security has seen organizations approach the initial hours of an incident in every conceivable way. In this white paper, discover the 1st steps security teams should take when responding to an incident.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Fidelis Endpoint : A Technical Deep Dive
sponsored by Fidelis
PRODUCT OVERVIEW: In this solution overview, learn how Fidelis Endpoint unifies endpoint detection and response (EDR) and endpoint protection platform (EPP) capabilities to meet the needs of IT endpoint management and mature security operations.
Posted: 20 Sep 2019 | Published: 20 Sep 2019

Fidelis

Six Steps for Building a Robust Incident Response Function
sponsored by IBM
WHITE PAPER: In the white paper "Six Steps for Building a Robust Incident Response Function" IBM Resilient provides a framework for security teams to build a strong incident response program and deliver organization-wide coordination and optimizations to accomplish these goals.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

IBM

2019 Cyberthreat Defense Report
sponsored by Gigamon
ANALYST REPORT: CyberEdge Group's 6th annual Cyberthreat Defense Report provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Download this report to uncover countless insights you can use to better understand how your priorities and security postures stack up against those of your peers.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Gigamon

Red Cloak Threat Detection & Responses
sponsored by Dell SecureWorks
WEBCAST: Secureworks has now released Red Cloak Threat Detection and Response, a cloud-based security analytics application that can help transform the way your security team detects, investigates and responds to threats. Download this webcast to hear John H. Collins, CISSP, discuss the key features of Red Cloak TDR.
Posted: 13 Sep 2019 | Premiered: Sep 13, 2019

Dell SecureWorks

Office 365 Anti-Phishing Tools
sponsored by Cisco Umbrella
EGUIDE: Microsoft released a new set of anti-phishing tools available as part of Office 365 Advanced Threat Protection. However, for these features to be effective, administrators need to understand how to use the tools and how to properly implement them. Download this e-guide to learn more.
Posted: 06 Sep 2019 | Published: 04 Sep 2019

Cisco Umbrella

Incident Response: Your How-To Guide
sponsored by Farsight Security
EGUIDE: As the rate of cybersecurity incidents grows, security teams are looking for all the help they can get to prevent, detect and respond to attacks. Incident response can help. Download this e-guide to learn how your organization can build an incident response framework, how and when to use incident response tools, and more.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Farsight Security

Comprehensive, Integrated Security with the Cynet 360 Platform
sponsored by Cynet
ANALYST REPORT: This IDC Vendor Profile provides an overview of Cynet 360, a platform for the detection of common and advanced threats and automated remediation. Download the vendor profile to learn more about Cynet today.
Posted: 03 Sep 2019 | Published: 03 Sep 2019


A Look Inside Financially Motivated Attacks and the Active FIN8 Threat Group
sponsored by Gigamon
ANALYST REPORT: Download this report to explore a detailed view into the inner workings of financially motivated threat actor groups, including their preferred tactics and tools. Gaining an understanding of the anatomy of these attacks can help your team to improve visibility into the threats and expedite rapid detection and response.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Gigamon

Security Analytics for Threat Detection and Breach Resolution in 2019
sponsored by Gigamon
ANALYST REPORT: While there is no security silver bullet, security analytics is a great step forward for any organization to improve its ability to detect threats. In this white paper, explore the top 4 considerations for investigating a security analytics tool.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Gigamon

MDR Buyer's Guide
sponsored by Arctic Wolf Networks, Inc.
EBOOK: Managed detection and response (MDR) is an increasingly popular approach that addresses security monitoring challenges, as it delivers real-time, 24/7 managed detection and response using a holistic, turnkey approach. Download this buyer's guide for key features you should look for in an MDR service.
Posted: 08 Aug 2019 | Published: 08 Aug 2019

Arctic Wolf Networks, Inc.

Dragos Industrial Cybersecurity Platform
sponsored by Dragos
VIDEO: The industrial security community faces strategic challenges in responding to cyberthreats. In this video, learn about Dragos' industrial cybersecurity platform which helps ICS defenders to identify assets, detect threats and respond via investigation playbooks.
Posted: 02 Aug 2019 | Premiered: 11 Nov 2018

Dragos

SOCs vs. AFCs: What's the Difference?
sponsored by Optiv
RESOURCE: Advances in technology have often been perceived as threats rather than opportunities, due to the reactionary nature of the SOC model. But, Advanced Fusion Centers (AFCs) offer a modern approach to cybersecurity replacing this reactive model with an agile one. In this blog, explore the differences between SOCs and AFCs.
Posted: 01 Aug 2019 | Published: 23 Jul 2019

Optiv

RSA Conference 2019 Security Operations Center Findings Summary
sponsored by RSA Conference
RESOURCE: The RSA Conference SOC analyzed the Moscone Center wireless traffic which is an open network during the week of the conference. The goal of the RSAC SOC is to use technology to educate conference attendees about what happens on a typical wireless network. Download this resource to explore key findings from the educational exhibit.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

RSA Conference

How Internet Isolation Eliminates Threats That Evade Sandboxes
sponsored by Menlo Security
WEBCAST: Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.
Posted: 25 Jul 2019 | Premiered: Jul 25, 2019

Menlo Security

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

CrowdStrike

How To Identify Compromised Devices With Certainty
sponsored by HelpSystems
WHITE PAPER: It is important for organizations to protect their devices from any threats. However, many security tools can't identify which alerts are important. In this white paper, learn how to avoid serious damage by focusing on swift detection and effective response.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

HelpSystems
1 - 25 of 181 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement