RSS feed Get our RSS feed

News by Topic

intrusion prevention

Results 51 - 75 of 121Sort Results By: Published Date | Title | Company Name
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
     HP - Enterprise
By: McAfee     Published Date: Jul 24, 2013
The most menacing type of cyberattack is invisible. The risk to enterprises is real as evidenced by recent high-profile attacks. Organizations need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : stealthy attacks, malware, intrusion prevention system, siem, layered security controls, security
     McAfee
By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Directorís agenda.
Tags : email archiving, ediscovery, compliance, legal, intrusion prevention, security
     Mimecast
By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
     Symantec
By: Kaseya     Published Date: Apr 04, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : it security, anti-virus, vulnerability management, intrusion prevention
     Kaseya
By: McAfee     Published Date: Mar 08, 2013
Databases store companiesí most valuable information assets, but in most cases theyíre poorly protected. Itís important to secure databases as well as or better than other systems in the enterprise. But itís not that simple.
Tags : real-time database monitoring, database authentication, database access control, database activity monitoring, database intrusion prevention, authentication and access control, database security
     McAfee
By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention
     Arbor
By: Tripwire     Published Date: Feb 08, 2013
Itís no small feat to balance access to data to meet business goals with protecting that very same data from hackers.
Tags : high availability, cloud, security, hacker detection, intrusion prevention
     Tripwire
By: Arbor     Published Date: Feb 07, 2013
HOW TO PROTECT YOUR DATA CENTERíS AVAILABILITY
Tags : arbor, firewalls, ddos protection, intrusion prevention systems, ips
     Arbor
By: McAfee     Published Date: Feb 06, 2013
Traditional antivirus or intrusion prevention systems are no match for the new breed of attacks; enterprises need layered security controls that work together to detect the presence and actions of stealthy malware and attackers.
Tags : security connected, stealthy attacks, rootkits, os level protection, hardware assisted security, endpoint security
     McAfee
By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security
     Arbor Networks
By: McAfee     Published Date: Jan 23, 2013
This paper discusses the six critical management capabilities of next-generation IPS solutions to help reduce operational overhead while unifying across multiple environments, streamlining security operations and protecting against targeted threats.
Tags : network security, intrusion prevention system, ips
     McAfee
By: McAfee     Published Date: Nov 14, 2012
Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise's most valuable information assets, but in most organizations they are poorly protected. It's common sense to secure databases, but it's not that simple.
Tags : database monitoring, auditing, intrusion prevention, database, mcafee
     McAfee
By: WatchGuard     Published Date: Oct 16, 2012
Network security intrusions and data theft incidents grab headlines almost daily. Organizations rely on WatchGuard for network solutions. Read on to understand why WatchGuard is "best-in-class by design"
Tags : watchguard, security, database security, security, it security, it infrastructure, intrusion prevention
     WatchGuard
By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence
     Proofpoint
By: Focus     Published Date: Nov 15, 2011
Learn the 9 most critical factors all small to medium-size businesses should know about data network security.
Tags : network, security, network security, attacks, intrusion, intrusion prevention, security, data network
     Focus
By: Dell SecureWorks     Published Date: Apr 17, 2011
Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.
Tags : isensor, secureworks, safeguard, firewalls, cyberthreats, threat protection, network security, midsize security
     Dell SecureWorks
By: Dell SecureWorks     Published Date: Apr 09, 2011
Read this whitepaper to learn how Dell SecureWorks' multi-phase Penetration testing can help you obtain a true understanding of your security and risk posture so that you can strengthen your defenses and prevent a successful attack.
Tags : intrusion prevention, dell, secureworks, attacks, network security, cyber risk, cyberrisk, penetration
     Dell SecureWorks
By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam, anti-virus, email encryption, intrusion prevention
     Symantec.cloud
By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
     HP
By: IBM     Published Date: Nov 20, 2009
The Payment Card Industry Data Security Standard (PCI DSS) is a global security program created to increase confidence in the payment card industry and reduce risks to PCI members, merchants, service providers and consumers. It was developed by the major credit card companies as a guideline to help organizations that process card payments prevent credit card fraud.
Tags : ibm, pci requirements, pci dss, credit card fraud, ibm iss certified assessments, ips, ibm public key infrastructure for z/os, ibm tivoli provisioning manager
     IBM
By: IBM     Published Date: Oct 13, 2009
Stopping inappropriate data access. This turnkey solution safeguards servers - where business data is stored and accessed - with a combination of software and managed security services that automate critical areas of security oversight. By monitoring and tracking system access, the solution is effective at enforcing security policies.
Tags : security threats, ibm, server, express mps, security policies, intrusion prevention, server sensor, internet security systems
     IBM
By: AirTight Networks     Published Date: Aug 21, 2009
More and more companies are realizing that their corporate air waves are an asset that requires protection. Strong security policies have been created for wired networks. The same is now needed for the corporate air waves. This paper will discuss the compelling business reasons why an investment in wireless intrusion prevention should be made.
Tags : intrusion prevention, wireless security, security policy, security policies, security management, governance, airtight, airtight networks
     AirTight Networks
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics