IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Intrusion Detection

RSS Feed   
Network Intrusion Detection Reports
 
Bridging Cybersecurity Gaps with Managed Detection and Response
sponsored by Trend Micro, Inc.
RESOURCE: Managed detection and response (MDR) enables a proactive approach to security with its ability to detect and fully analyze threats and promptly respond to incidents. With the complexity of today's threats the stakes are high. In this resource, look at how MDR can face cybersecurity challenges.
Posted: 26 Feb 2019 | Published: 02 Oct 2018

Trend Micro, Inc.

How To Identify Compromised Devices With Certainty
sponsored by HelpSystems
WHITE PAPER: It is important for organizations to protect their devices from any threats. However, many security tools can't identify which alerts are important. In this white paper, learn how to avoid serious damage by focusing on swift detection and effective response.
Posted: 19 Jul 2019 | Published: 19 Jul 2019

HelpSystems

2018 State of Security Operations:Report of the Capabilities and Maturity of Cyber Defense Organizations Worldwide
sponsored by Micro Focus
WHITE PAPER: Micro Focus Security Intelligence and Operations Consulting (SIOC) has assessed the capabilities and maturity of 144 discreet SOCs since 2008. In this 5th Annual State of Security Operations report, review insights into what makes some of the most advanced cyberdefense centers around the globe successful.
Posted: 07 Feb 2019 | Published: 31 Aug 2018

Micro Focus

The Essential Guide To Fraud
sponsored by Splunk
WHITE PAPER: Threat actors are constantly discovering new ways to commit fraud to exploit a wide range of online services. Companies and their customers face the risk of losing money, ruining reputations and protecting the integrity of programs. In this white paper, learn how to protect your business against fraudulent activity.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk

Endpoint Detection and Response
sponsored by CrowdStrike
RESEARCH CONTENT: This Forrester Wave report evaluates Endpoint Detection and Response (EDR) providers. It also shows how different provides measure up and includes key takeaways from the research. Download the report, to discover the top 12 vendors based on a 20-criteria evaluation.
Posted: 27 Mar 2019 | Published: 05 Jul 2018

CrowdStrike

Real-Time Automated Endpoint Security
sponsored by enSilo
DATA SHEET: enSilo's real-time automated endpoint security has a mission to deliver comprehensive real-time endpoint protection offering post- and pre-infection protection against advance malware. In this resource, learn more about the benefits of enSilo.
Posted: 22 May 2019 | Published: 22 May 2019


Unified Security Management: Real-time Threat Detection
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AT&T Cybersecurity

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

DellEMC and Intel®

Cryptojacking Attacks May Not Challenge Ransomware Dominance
sponsored by Cisco Umbrella
EGUIDE: Cryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
Posted: 28 Aug 2018 | Published: 12 Apr 2018

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement