IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Intrusion Prevention

RSS Feed   
ALSO CALLED: Network Intrusion Prevention, Host Intrusion Prevention, Intrusion Protection, Network Intrusion Management
DEFINITION: Diffie-Hellman key exchange, also called exponential key exchange, is a method of digital encryption that uses numbers raised to specific powers to produce decryption keys on the basis of components that are never directly transmitted, making the task of a would-be code breaker mathematically overwhelming. To implement Diffie-Hellman, the two end users Alice and Bob, while communicating over a channel  … 

Intrusion Prevention definition sponsored by SearchSecurity.com, powered by WhatIs.com an online computer dictionary
Intrusion Prevention Reports
1 - 25 of 219 Matches Previous Page  |  Next Page
Critical Watch Report: The State of Threat Detection 2018
sponsored by Alert Logic
RESEARCH CONTENT: High-profile data breaches continue to make headlines, but the real news is the dramatic increase in volume and the intensity of cyberattacks it now affecting organizations of all sizes and types. Learn how your organization can keep up with the fast-moving threat landscape with 5 key security insights.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

Alert Logic

Armor File Integrity Monitoring (FIM)
sponsored by Armor
RESOURCE: Download this resource to learn about an additional layer of security that can protect your cloud, on-premise, hybrid, or hosted IT environment from threats.
Posted: 20 Nov 2018 | Published: 20 Nov 2018

Armor

SECaaS is Here: Everything you Need to Know
sponsored by Armor
WHITE PAPER: SECaaS, or security-as-a-service, can help organizations like yours, defend against advanced threats, detect intruders, and more. Read on to learn the details.
Posted: 15 Nov 2018 | Published: 15 Nov 2018

Armor

5 Top Recommendations for Effective Threat Detection
sponsored by Alert Logic
RESOURCE: If your organization is looking to improve the effectiveness of your threat detection program, uncover the top 5 recommendations for effective threat detection, today.
Posted: 30 Aug 2018 | Published: 30 Aug 2018

Alert Logic

Threat Monitoring, Detection and Response
sponsored by Alert Logic
RESEARCH CONTENT: Information security teams worldwide are increasingly concerned about the rapid growth of cyberthreats. To address this concern, a survey was conducted to explore the perspectives of cybersecurity professionals on several important threat lifecycle topics. Download this report for a comprehensive snapshot into the key survey findings.
Posted: 28 Aug 2018 | Published: 28 Aug 2018

Alert Logic

2018 Annual Cybersecurity Report At-A-Glance: Cloud Security
sponsored by Cisco Umbrella
RESEARCH CONTENT: The Cisco 2018 Annual Cybersecurity Report for Cloud Security examines the techniques and strategies that adversaries use to break through defenses and evade detection. Get the at-a-glance report for cloud security.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cisco Umbrella

Network DLP Buyer's Guide
sponsored by Fidelis
ESSENTIAL GUIDE: Download this DLP buyer's guide for everything your organization should be aware of when approving a Network DLP approach to meet modern day security challenges.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Fidelis

How to Prevent Cloud Cryptojacking Attacks on your Enterprise
sponsored by Cisco Umbrella
EGUIDE: Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.
Posted: 24 Aug 2018 | Published: 31 May 2018

Cisco Umbrella

Operationalizing Threat Intelligence Using Splunk Enterprise Security
sponsored by Splunk
WHITE PAPER: Explore the challenges and requirements of implementing high-coverage threat intelligence, and how your organization can achieve operational maturity.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Splunk

Mitigate Business and Security Risk with Splunk
sponsored by Splunk
WHITE PAPER: Learn how your organization can better understand the gaps and vulnerabilities in your environment in order to reduce risk to your business through risk mitigation.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Splunk

The State of the SOC: An Enterprise Study on Threat Detection and Response
sponsored by Fidelis
RESEARCH CONTENT: Today, many Security Operations Centers (SOCs) are highly targeted by cybercriminals and their security analysts are being overwhelmed. Download this report to gain insights on the specific challenges faced in the SOC.
Posted: 21 Aug 2018 | Published: 31 Mar 2018

Fidelis

Capture the Flag with Deception Defenses
sponsored by Fidelis
WHITE PAPER: Deception — the use of decoys, traps, lures and other mechanisms — is quickly gaining the attention of organizations seeking an efficient post-breach detection technology. Learn how your organization can be a part of the cyberdeception trend to expose attacks as they happen.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

Fidelis

What's Hiding Within Your Metadata? How to Decode Your Network's Deepest and Darkest Secrets
sponsored by Fidelis
WHITE PAPER: Find out how metadata can transform the way you detect and investigate critical security threats in your network.
Posted: 20 Aug 2018 | Published: 20 Aug 2018

Fidelis

Automate & Accelerate Your Security Operations
sponsored by Fidelis
EBOOK: Put your current threat detection and response strategy to the test and with a checklist of the 5 must have security automation capabilities to see if your enterprise is up to speed.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

Fidelis

First Midwest Bank Uses Fidelis Deception to Detect and Respond to Security Anomalies
sponsored by Fidelis
CASE STUDY: Learn how a community bank used Fidelis Deception to detect and respond to incidents in their network, catching cybercriminals in the act.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Utilizing Deception for Effective Breach Detection
sponsored by Fidelis
WHITE PAPER: Learn how sophisticated deception software can cover all of the phases of the attack life cycle within your network, so you can catch cybercriminals in the act.
Posted: 16 Aug 2018 | Published: 16 Aug 2018

Fidelis

Fidelis Deception Demo - Product Overview
sponsored by Fidelis
VIDEO: Tune into this webinar to learn how your organization can use modern deception defenses to ensure an efficient and strong post-breach defense.
Posted: 14 Aug 2018 | Premiered: 14 Aug 2018

Fidelis

The Confidence Game: How to Build a People-centric Cybersecurity Strategy
sponsored by Proofpoint, Inc.
VIDEO: Learn how your organization can take a people-centric approach to security and find out how humans are increasingly becoming the #1 target for cyberattacks.
Posted: 30 Oct 2018 | Premiered: 29 Oct 2018

Proofpoint, Inc.

Considerations for EDR Adoption
sponsored by Bitdefender
RESEARCH CONTENT: Navigate through the issues surrounding endpoint detection response (EDR), explore the business value of its adoption, and learn recommendations for the range of considerations and next steps in the decision-making process. Download to learn more.
Posted: 10 Oct 2018 | Published: 30 Sep 2018

Bitdefender

How to Protect Privileged Accounts with an Incident Response Plan
sponsored by Thycotic
RESOURCE: Today, cybercriminals can create a blueprint of the entire network and operations. Discover the telltale indicators you're under attack and the plans you need to have in place to protect your privileged accounts.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

Thycotic

The Impact of Security Automation on Enterprise IT
sponsored by Juniper Networks
EGUIDE: The use of security automation and orchestration systems is on the rise, due to their ability to provide automatic responses to threats. Learn how SAO and automated incident response can benefit security in the cloud and in your enterprise.
Posted: 21 Sep 2018 | Published: 19 Sep 2018

Juniper Networks

7 Experts on Security Automation and Analytics
sponsored by Juniper Networks
EBOOK: In this e-book, 7 cybersecurity experts share their insights, strategies, and best practices surrounding security automation and analytics. Learn how their takeaways can help you overcome some of the complexities associated with security automation and analytics, today.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Juniper Networks

Intelligent Orchestration
sponsored by IBM Resilient
WHITE PAPER: Learn how your organization can battle complex cyberattacks with this intelligent approach to incident response and security operations.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

IBM Resilient

Advanced Endpoint Protection
sponsored by NSS Labs
EBOOK: In this product analysis by NSS Labs, learn how you can detect, prevent, and continuously monitor threats, with the right advanced endpoint protection approach for your organization.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

NSS Labs

100G+ IDS/IPS Solutions that Enable Monitoring
sponsored by ADLINK Technology
RESOURCE: In this resource you can learn about traditional detection technologies, challenges of protecting web-based networks, user-based behavioral analysis to detect abnormal behavior, and more.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

ADLINK Technology
1 - 25 of 219 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement