IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Network Intrusion Prevention

RSS Feed   
Network Intrusion Prevention Reports
 
Solution Brief: Malwarebytes Endpoint Detection and Response
sponsored by Malwarebytes
DATA SHEET: Endpoints have never been under greater threat: Attacks have doubled, false positives are skyrocketing and the complexity of EDR solutions is putting a strain on endpoint security. You can combat these issues with endpoint security that’s integrated, proactive and continuous. Check out this white paper to examine easy, effective, efficient EDR.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Malwarebytes

Measuring the ROI of an Incident Response Platform
sponsored by Palo Alto Networks
WHITE PAPER: A Forrester survey found that 80% of businesses had been attacked last year, and only 50% felt they had the right resources to proactively hunt for threats. Organizations tend to place incident response on the backburner, but it’s clear they wish they’d been better prepared for ‘what ifs’. In this guide, learn how to stay ahead of threats.
Posted: 03 Sep 2020 | Published: 03 Sep 2020

Palo Alto Networks

2020 Threat Hunting Survey Results
sponsored by DomainTools
RESEARCH CONTENT: Each year, SANS conducts a Threat Hunting Survey to better understand the threat hunting landscape and how security professionals are conducting threat hunting in their organizations – read on to unlock the results from this year’s survey.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

DomainTools

Secureworks: Connecting the Dots
sponsored by Dell SecureWorks
WEBCAST: As threats become harder to detect, security teams must invest in modern solutions that detect, investigate and respond to threats across endpoints, network and the cloud. View this Secureworks webinar for a real-world style attack on an organization and learn how a security professional can use XDR to see and mitigate the attack.
Posted: 12 Mar 2021 | Premiered: Mar 12, 2021

Dell SecureWorks

Complete Endpoint Protection
sponsored by Cybereason
DATA SHEET: In today’s fast-paced and increasingly distributed business environment, protecting the growing population of endpoints from cyberthreats has become increasingly challenging. In this data sheet, discover the key capabilities of Cybereason’s endpoint protection platform and see if it aligns with your endpoint security strategy.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Cybereason

Supercharge Incident Response with DDI Visibility
sponsored by Infoblox
WHITE PAPER: Companies are looking for ways to improve their incident response mechanisms – but some avenues often go unexplored. DDI is the shorthand of DNS, DHCP (Dynamic Host Configuration Protocol) and IPAM (IP Address Management). Access this SANS report to learn how DDI visibility can aid in incident response.
Posted: 16 Feb 2021 | Published: 30 Nov 2020

Infoblox

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info