RSS feed Get our RSS feed

News by Topic

intrusion prevention

Results 101 - 122 of 122Sort Results By: Published Date | Title | Company Name
By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : quocirca, bank, banks, financial services, finserve, finserv, network security, customer data
     Quocirca
By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security
     Nixu
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : network security, access control, nac, network access control, intrusion prevention, landesk
     LANDesk
By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware
     LANDesk
By: GFI     Published Date: Jun 12, 2007
This white paper examines why having multiple anti-virus scanners at mail server level substantially reduces the chance of virus infection and explores ways in which this can be achieved.
Tags : anti virus, anti-virus, virus, norton, network security, email security, intrusion prevention, ips
     GFI
By: GFI     Published Date: Jun 12, 2007
Describing what trojans are and why they pose a danger to corporate networks, this paper discusses the need and method to protect your network from the threat of trojans.
Tags : network security, trojan, trojans, anti virus, anti-virus, virus, email security, internet security
     GFI
By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : hacker detection, hackers, ips, ids, intrusion detection, intrusion prevention, internet security, events manager
     GFI
By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
     Perimeter
By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
     Perimeter
By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids
     Perimeter
By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware
     Perimeter
By: Perimeter     Published Date: Jul 17, 2007
Before Microsoft released Microsoft XP Service Pack 2 (SP2), most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. Newer attack methods were starting to be seen where the attacker would take advantage of vulnerabilities within the Internet browser itself.
Tags : virus, anti-virus, anti virus, spyware, windows xp, xp sp2, intrusion detection, ids
     Perimeter
By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
     Technolytics
By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation
     Netwrix
By: Microworld     Published Date: Dec 12, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
Tags : spam, email security, anti-spam, anti spam, email, intrusion prevention, mail scan, mailscan
     Microworld
By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Directors agenda.
Tags : email archiving, ediscovery, compliance, legal, intrusion prevention, security
     Mimecast
By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking communitywhere they are well known and have been in widespread use for several yearsthere are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
     McAfee
By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Heres advice on how to evade AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet
     McAfee
By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking communitywhere they are well known and have been in widespread use for several yearsthere are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book youll find out all about AETs, and get useful pointers and advice to help you secure your organization. If youre working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what youre up against and how to better protect against advanced evasions.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
     Intel Security
By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologiesincluding both public and private clouds. Youll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you wont be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
     Juniper Networks
By: Cisco EMEA     Published Date: May 15, 2018
Il Gruppo Marcegaglia conferma una strategia di sicurezza IT basata su soluzioni Cisco che va dagli strumenti di firewall al sistema di Next-Generation Intrusion Prevention System passando per la gestione centralizzata. Il Gruppo Marcegaglia la realt industriale leader mondiale nella trasformazione dellacciaio che opera dallItalia a livello globale, con una presenza di 43 stabilimenti distribuiti su una superficie complessiva di 6 milioni di metri quadrati. Fanno parte del Gruppo 7.000 dipendenti, 60 unit e 210 rappresentanze commerciali per un fatturato che, nel 2013, stato di oltre 4 miliardi di euro nel settore dellacciaio e diversificate. Il tutto grazie alla produzione quotidiana di 5.500 chilometri di manufatti in acciaio inossidabile e al carbonio per oltre 15.000 clienti, per un totale di oltre 5 milioni di tonnellate lavorate ogni anno.
Tags : 
     Cisco EMEA
Start   Previous    1 2 3 4 5     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics