IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed   
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. To implement Diffie-Hellman, the two end users Alice and Bob, while communicating over a channel  … 

Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Prevention Reports
1 - 25 of 163 Matches Previous Page  |  Next Page
Security Orchestration, Automation and Response (SOAR) for MSSPs
sponsored by Swimlane
WHITE PAPER: Success and growth in the MSSP business requires balancing the delivery on multiple customer service level agreements (SLAs) with cost-effective operations. But, advances in SOAR offer MSSPs a number of ways to meet SLAs, improve response times and deliver better security. In this white paper, learn more about the potential of SOAR for MSSPs.
Posted: 18 Apr 2019 | Published: 18 Apr 2019

Swimlane

Endpoint Protection Plus Webinar
sponsored by Ziften
WEBCAST: Endpoint protection can be complex and leave your organization vulnerable to attackers. This is because most endpoints aren't patched or users disable security tools. In this webcast, listen as Ziften's Roark Pollock and Logan Gilbert discuss 10 things to consider when looking at endpoint protection platforms.
Posted: 16 Apr 2019 | Premiered: Apr 16, 2019

Ziften

8 Real-World Use Cases for Security Orchestration, Automation and Response (SOAR)
sponsored by Swimlane
WHITE PAPER: Security operations present an escalating series of management challenges. However, SOAR platforms can help security teams automate tasks and aggregate data. This allows security teams to handle more tasks while decreasing mean times to resolution. In this white paper, explore 8 real-world uses cases for SOAR platforms.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Swimlane

Security Orchestration, Automation and Response (SOAR) Capabilities
sponsored by Swimlane
EBOOK: Cybersecurity is a high-wire act, with significant challenges tied to both technology and operations. Protecting digital assets requires the right tools and processes. One way to handle the growing workload is by using SOAR platforms. In this e-book, review what it takes for a SOAR platform to be successful.
Posted: 16 Apr 2019 | Published: 16 Apr 2019

Swimlane

Faster Response With Crowdstrike and MITRE ATT&CK™
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 11 Apr 2019 | Published: 11 Apr 2019

CrowdStrike

Security Information and Event Management (SIEM) Solutions
sponsored by Rapid7
WHITE PAPER: As the security landscape has evolved, SIEMs have evolved as well. However, many organizations struggle to deploy a new SIEM, achieve rapid success, and deliver a return on investment. In this white paper, learn how to evaluate SIEM platforms. Also, discover the top 3 capabilities every SIEM should provide.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

Rapid7

Pillars of Protection: A New View of Enterprise Security
sponsored by Oracle Corporation
WHITE PAPER: Organizations today need to be protected at every layer – in the data center and in the cloud. Read on to learn how you can defend your business with the 3 pillars of protection.
Posted: 04 Apr 2019 | Published: 31 Jul 2018

Oracle Corporation

How to Get Started with the NIST Cybersecurity Framework
sponsored by Expel
WHITE PAPER: The NIST Cybersecurity Framework can be very useful to help companies understand where they are and where they are going as they grow their broader cyber risk management program. In this white paper, Expel shares how using their Expel service has helped their CSF scores. Also learn how Expel can help you on the road to CSF nirvana.
Posted: 01 Apr 2019 | Published: 01 Apr 2019

Expel

The Essential Guide To Fraud
sponsored by Splunk
WHITE PAPER: Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

The SIEM Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

Endpoint Zero Trust Protection in a Connected World
sponsored by AppGuard
RESOURCE: In this resource, discover the security capabilities of AppGuard and how your organization could benefit from its zero-trust protection strategy.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

AppGuard

Managed Detection and Response vs. Managed Security Services: The Difference and How to Choose
sponsored by MASERGY
WHITE PAPER: The world of managed security services is expanding with Managed Detection and Response (MDR) services. This new approach is designed to accelerate threat discovery and response time, but what is MDR? How is it different from managed security service providers (MSSPs)? In this white paper, learn about the differences between MDR and MSSPs.
Posted: 12 Mar 2019 | Published: 12 Mar 2019

MASERGY

Modern Incident Response: The Definitive Guide
sponsored by PagerDuty
WHITE PAPER: In this guide, discover incident best practices, and capabilities you can leverage to embed those best practices into your response process today.
Posted: 06 Mar 2019 | Published: 06 Mar 2019

PagerDuty

Deploy Symantec Cloud Workload Protection for Storage
sponsored by Symantec
EBOOK: As organizations generate increasing amounts of information, they need to securely collect, store, and rapidly analyze this data. In this eBook, learn how Cloud Workload Protection for Storage can help your organization implement a robust security strategy that will enhance the protection of your stored data from malware and threats.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Symantec

Bridging Cybersecurity Gaps with Managed Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: Managed detection and response (MDR) enables a proactive approach to security with its ability to detect and fully analyze threats and promptly respond to incidents. With the complexity of today's threats the stakes are high. In this resource, look at how MDR can face cybersecurity challenges.
Posted: 26 Feb 2019 | Published: 02 Oct 2018

Trend Micro, Inc.

Security Investigation, Detection & Rapid Response with Splunk Enterprise
sponsored by Splunk Services UK Ltd
WHITE PAPER: Investigation and rapid response is critical for day-to-day alert handling. The faster a threat and its impact can be detected and investigated, the faster an organization can take action. In this white paper, learn about how the Splunk platform enables organizations to understand their potential security threats and take the necessary actions.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk Services UK Ltd

Operationalizing Threat Intelligence Using Splunk® Enterprise Security
sponsored by Splunk Services UK Ltd
WHITE PAPER: Threat intelligence can provide critical security perspectives needed to inform an organization about current threats and to help develop a strategy against future threats. In this white paper, learn about the challenges and requirements of implementing high-coverage threat intelligence.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk Services UK Ltd

The Seven Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk Services UK Ltd
WHITE PAPER: There is no shortage of options for storing data. Collecting all security relevant data and turning all that data into actionable intelligence, however, is a whole other matter. An analytics-driven SIEM allows IT to monitor threats and respond quickly to incidents. In this white paper, discover 7 essential capabilities of an analytics-driven SIEM.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Splunk Services UK Ltd

UCAS Secures Millions of University Applications With Splunk Enterprise Security Analytics
sponsored by Splunk Services UK Ltd
CASE STUDY: The Universities and Colleges Admissions Service (UCAS) is the U.K.'s shared admissions service for higher education. They host a complex flow of sensitive, personal data. Therefore, it is important that they deliver faultless security assurance. In this case study, learn how UCAS was able to meet these security needs by adopting Splunk.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

Splunk Services UK Ltd

Definitive Guide to SOAR 2019
sponsored by LogRhythm, Inc.
EBOOK: Today's cyberattackers are more formidable and sophisticated than ever before. As a result, organizations are adjusting their focus to include rapid detection and response. The faster they can detect and respond to threats, the lower the risk of threats. In this eBook, learn how to work accurately and quickly when your corporation is at risk.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

LogRhythm, Inc.

Travis Perkins PLC Adopts Analytics-Driven SIEM to Enable Hybrid Cloud Transition
sponsored by Splunk Services UK Ltd
CASE STUDY: Travis Perkins PLC's existing SIEM solution couldn't provide the necessary security insights across its hybrid environment. They reviewed the alternatives available and selected the Splunk platform as their new SIEM. In this case study, discover the benefits that Travis Perkins PLC has seen since deploying the Splunk platform.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

Splunk Services UK Ltd

2018 Global Study on Application Security
sponsored by Arxan
RESEARCH CONTENT: Ponemon Institute conducted a survey to understand the risk that unprotected applications pose to businesses when running in unsecured environments and how organizations are addressing this risk in practice. In this research report, learn about key findings from the survey.
Posted: 14 Feb 2019 | Published: 31 May 2018

Arxan

5 Identity Pitfalls to Avoid
sponsored by Onfido
RESOURCE: Identity theft accounts for half of all reported fraud in the UK. And if you fail to catch that fraud, the cost to your business – both reputational and financial – can be catastrophic. Do you know the 5 most common identity pitfalls that businesses fall afoul of – and crucially, how to avoid them?
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido
1 - 25 of 163 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement