IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Intrusion Prevention

RSS Feed   
Network Intrusion Prevention Reports
 
Definitive Guide to SOAR 2019
sponsored by LogRhythm, Inc.
EBOOK: Today's cyberattackers are more formidable and sophisticated than ever before. As a result, organizations are adjusting their focus to include rapid detection and response. The faster they can detect and respond to threats, the lower the risk of threats. In this eBook, learn how to work accurately and quickly when your corporation is at risk.
Posted: 18 Feb 2019 | Published: 18 Feb 2019

LogRhythm, Inc.

Definitive Guide to Deception 2.0
sponsored by Acalvio
EBOOK: Currently, there exists a fundamental asymmetry in the security industry – we must get it right all the time, while the threat actor must get it right only once. But, with deception, the bad guys must be wrong only once to get caught. In this e-book, discover 10 essential requirements of a potent deception technology.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Acalvio

Fidelis Deception Demo
sponsored by Fidelis
WEBCAST: Download this video for an overview of Fidelis Deception. In the video, you'll learn how to use Fidelis to map your network and understand your terrain, how to deploy deception and more.
Posted: 23 Sep 2019 | Premiered: Sep 23, 2019

Fidelis

Security Investigation, Detection & Rapid Response with Splunk Enterprise
sponsored by Splunk
WHITE PAPER: Investigation and rapid response is critical for day-to-day alert handling. The faster a threat and its impact can be detected and investigated, the faster an organization can take action. In this white paper, learn about how the Splunk platform enables organizations to understand their potential security threats and take the necessary actions.
Posted: 20 Feb 2019 | Published: 20 Feb 2019

Splunk

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 25 Oct 2019 | Published: 25 Oct 2019

ServiceNow

A Guide to Digital Identity Verification: The Technology and Trends
sponsored by Onfido
WHITE PAPER: An all-digital world amplifies the classic threats of service misuse, identity impersonation and money laundering. Thankfully, artificial intelligence and machine learning techniques have finally matured—and with them, we can improve online identity management. Download this white paper to learn more.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

Onfido

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Five Critical Steps to Achieving an Effective Application Security Program
sponsored by IBM
WHITE PAPER: Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.
Posted: 08 Oct 2014 | Published: 31 Dec 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement