IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed   
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. To implement Diffie-Hellman, the two end users Alice and Bob, while communicating over a channel  … 

Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Prevention Reports
1 - 25 of 179 Matches Previous Page  |  Next Page
MDR Buyer's Guide
sponsored by Arctic Wolf Networks, Inc.
EBOOK: Managed detection and response (MDR) is an increasingly popular approach that addresses security monitoring challenges, as it delivers real-time, 24/7 managed detection and response using a holistic, turnkey approach. Download this buyer's guide for key features you should look for in an MDR service.
Posted: 08 Aug 2019 | Published: 08 Aug 2019

Arctic Wolf Networks, Inc.

Dragos Industrial Cybersecurity Platform
sponsored by Dragos
VIDEO: The industrial security community faces strategic challenges in responding to cyberthreats. In this video, learn about Dragos' industrial cybersecurity platform which helps ICS defenders to identify assets, detect threats and respond via investigation playbooks.
Posted: 02 Aug 2019 | Premiered: 11 Nov 2018

Dragos

SOCs vs. AFCs: What's the Difference?
sponsored by Optiv
RESOURCE: Advances in technology have often been perceived as threats rather than opportunities, due to the reactionary nature of the SOC model. But, Advanced Fusion Centers (AFCs) offer a modern approach to cybersecurity replacing this reactive model with an agile one. In this blog, explore the differences between SOCs and AFCs.
Posted: 01 Aug 2019 | Published: 23 Jul 2019

Optiv

RSA Conference 2019 Security Operations Center Findings Summary
sponsored by RSA Conference
RESOURCE: The RSA Conference SOC analyzed the Moscone Center wireless traffic which is an open network during the week of the conference. The goal of the RSAC SOC is to use technology to educate conference attendees about what happens on a typical wireless network. Download this resource to explore key findings from the educational exhibit.
Posted: 29 Jul 2019 | Published: 29 Jul 2019

RSA Conference

How ALTR Addresses the Top 5 Human Threats to Data
sponsored by ALTR
RESOURCE: There are a number of ways cybercriminals can gain access to your organization's sensitive data. In this resource, explore the top 5 human threats to data and learn how ALTR can address each of these threats.
Posted: 25 Jul 2019 | Published: 25 Jul 2019

ALTR

How Internet Isolation Eliminates Threats That Evade Sandboxes
sponsored by Menlo Security
WEBCAST: Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.
Posted: 25 Jul 2019 | Premiered: Jul 25, 2019

Menlo Security

Faster Response with Crowdstrike and MITRE ATT&CK
sponsored by CrowdStrike
WHITE PAPER: As responders often lack the time and resources to investigate every alert, or even prioritize the most critical ones, a high-risk threat might go unnoticed. Potentially, this could allow devastating breaches to occur. In this white paper, learn how adopting the common industry framework MITRE ATT&CK can solve this challenge.
Posted: 24 Jul 2019 | Published: 24 Jul 2019

CrowdStrike

How To Identify Compromised Devices With Certainty
sponsored by HelpSystems
WHITE PAPER: It is important for organizations to protect their devices from any threats. However, many security tools can't identify which alerts are important. In this white paper, learn how to avoid serious damage by focusing on swift detection and effective response.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

HelpSystems

Go Beyond Next-Gen IPS
sponsored by Trend Micro, Inc.
WHITE PAPER: Organizations have relied on next-gen IPS to detect and block threats at wire speed. But with the first next-gen IPS arriving on the scene more than a decade ago, at what point does "next generation" become "current generation"? In this white paper, learn why enterprises can no longer solely rely on a next-gen IPS to protect their networks.
Posted: 11 Jul 2019 | Published: 31 May 2018

Trend Micro, Inc.

Stay Protected with a Layered Network Defense
sponsored by Trend Micro, Inc.
WHITE PAPER: Learn why standalone next-generation intrusion prevention systems (NGIPS) are still an enterprise requirement.
Posted: 10 Jul 2019 | Published: 10 Jul 2019

Trend Micro, Inc.

Breach Detection Systems Test Report
sponsored by Trend Micro, Inc.
ANALYST REPORT: NSS Labs performed an independent test of the Trend Micro Deep Discovery Inspector Model 4000. In this Breach Detection System Test Report, explore the Deep Discover Inspector's security effectiveness, network performance and more.
Posted: 10 Jul 2019 | Published: 11 Oct 2018

Trend Micro, Inc.

Using Wire Data for Security Forensics
sponsored by Viavi
WHITE PAPER: Security threats and attacks are growing in number and becoming increasingly more malicious, posing a severe threat to business survival. This white paper explains the means and importance of moving to a full wire data collection and enhancement strategy for both NetOps and SecOps operational and forensic capabilities.
Posted: 09 Jul 2019 | Published: 31 Mar 2019

Viavi

Acalvio Deception Intro Video
sponsored by Acalvio
WEBCAST: In cyberdefense, deception is being used to detect malicious activity with very high fidelity, dramatically shrinking the dwell time from months to weeks. Despite its success, deploying deception has been a massive challenge. In this webcast, learn how ShadowPlex addresses these challenges head-on.
Posted: 27 Jun 2019 | Premiered: Jun 27, 2019

Acalvio

Explore the ROI of CylancePROTECT and CylanceOPTICS
sponsored by Blackberry Cylance
WHITE PAPER: To protect endpoints, servers, and cloud workloads, CylancePROTECT and CylanceOPTICS provide an AI-driven threat prevention, detection, and response platform. In this Forrester Total Economic Impact study, examine the potential ROI enterprises realize after deploying these Cylance platforms.
Posted: 26 Jun 2019 | Published: 31 May 2019

Blackberry Cylance

Definitive Guide to Deception 2.0
sponsored by Acalvio
EBOOK: Currently, there exists a fundamental asymmetry in the security industry – we must get it right all the time, while the threat actor must get it right only once. But, with deception, the bad guys must be wrong only once to get caught. In this e-book, discover 10 essential requirements of a potent deception technology.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Acalvio

3 Minutes Until the Apocalypse
sponsored by Acalvio
WHITE PAPER: Most organizations utilize a SIEM in their SOC to aggregate, correlate and prioritize alerts presented to the frontline SOC Analyst. However, with a myriad of logs feeding into the SIEM, it is a daunting task to keep up with the alerts on the screen. In this white paper, learn 3 things security teams can do to make their lives better.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Acalvio

High-Fidelity Breach Detection with Acalvio Autonomous Deception
sponsored by Acalvio
ANALYST REPORT: ESG Lab validated that Acalvio ShadowPlex is quick and easy to implement at scale. ShadowPlex can deploy hundreds of deception points across numerous network segments and automatically scan your network and make configuration recommendations. Download this ESG lab review to learn more about Acalvio ShadowPlex today.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

Acalvio

Complete and Differentiated Managed Endpoint Detection and Response Services with Ensilo
sponsored by enSilo
RESOURCE: The market for managed endpoint security services is both changing and growing. Providers are moving beyond traditional managed security services and offering services that protect against advanced threats. In this resource, learn how with enSilo, MSSPs can provide more effective and faster security.
Posted: 23 May 2019 | Published: 23 May 2019


Red Cloak Threat Detection & Response
sponsored by Dell SecureWorks
RESOURCE: Security environments are now frustratingly fragmented. Even the most modern security stacks are a varied mix of vendors and tools. In this resource, learn how with Red Cloak Threat Detection & Response you can take security into your own hands and transform the way your security analysts detect, investigate and respond to threats.
Posted: 22 May 2019 | Published: 22 May 2019

Dell SecureWorks

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


Access & Protect Your Data – Anywhere, Anytime
sponsored by TITUS
WHITE PAPER: The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.
Posted: 15 May 2019 | Published: 15 May 2019

TITUS

Five Myths of Network Security in a Hybrid Infrastructure
sponsored by Trend Micro, Inc.
WHITE PAPER: Not surprisingly, the transition to a hybrid infrastructure is creating confusion among both security professionals and vendors regarding where security controls should be deployed. In this white paper, explore 5 myths about the need for traditional network security in a hybrid infrastructure.
Posted: 13 May 2019 | Published: 31 Mar 2019

Trend Micro, Inc.

Beginner's Guide to Open Source Intrusion Detection Tools
sponsored by AT&T Cybersecurity
WHITE PAPER: Threat and intrusion detection have become a top priority in cybersecurity, making it more important than ever. If you aren't already running an intrusion detection system (IDS) in your network, you should start now. In this white paper, explore different IDS tools to determine which would be the best fit for your organization.
Posted: 10 May 2019 | Published: 10 May 2019

AT&T Cybersecurity

Security Operations Center: Build It Or Buy It
sponsored by Armor
WHITE PAPER: Organizations have come to realize the only way to protect their networks around the clock is with a security operations center (SOC). This white paper can help you decide whether to build or buy a SOC by exploring the staffing, technology, and costs required to operate a successful SOC.
Posted: 02 May 2019 | Published: 30 Nov 2018

Armor

Armor File Integrity Monitoring (FIM)
sponsored by Armor
WHITE PAPER: When traditional firewalls or IDS fail to prevent or detect a threat, monitoring operating system and application changes at the host level provides an additional layer of security. In this white paper, learn more about Armor's File Integrity Monitoring which watches your hosts for unauthorized activities to detect potential threats.
Posted: 01 May 2019 | Published: 01 May 2019

Armor
1 - 25 of 179 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement