RSS feed Get our RSS feed

News by Topic

intrusion prevention

Results 76 - 100 of 121Sort Results By: Published Date | Title | Company Name
By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : vpn, access control, security management, ssl, network access control, nac, policy management, security policies
     Aventail
By: Internet Security Systems     Published Date: Aug 21, 2009
Protecting desktop and server, or host systems has rapidly become a high priority for organizations that want to ensure uptime and the availability of day-to-day business applications. Today's hybrid threats are growing faster, more complex and more destructive.
Tags : intrusion prevention, high availability, network security, iss, internet security, web security, malware, internet security systems
     Internet Security Systems
By: Internet Security Systems     Published Date: Aug 21, 2009
Intrusion Prevention Systems (IPS) are rapidly becoming an integral part of an effective network defense solution. Unfortunately, finding the truth in today's often overhyped market of network-based IPS offerings is no easy task.
Tags : intrusion prevention
     Internet Security Systems
By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based
     Mirage Networks
By: netVigilance     Published Date: Aug 21, 2009
Managing network vulnerabilities will be the biggest challenge for C-Level executives in the coming years. Intrusions are more frequent and more malicious, so the security of corporate networks, and therefore the security of the entire corporation are dependent on the ability to quickly identify, prioritize and remediate vulnerabilities in the network.
Tags : cost control, it spending, network security, budget, ids, intrusion prevention, vulnerability management, net vigilance
     netVigilance
By: netVigilance     Published Date: Aug 21, 2009
This white paper explains the evolving needs for vulnerability assessment, the special requirements inherent within large enterprises, and how SecureScout SP from netVigilance meets those needs.
Tags : vulnerability management, ips, intrusion prevention, security management, hackers, hacker, hacker detection, network security
     netVigilance
By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Security Event Aggregation and Correlation Engine (N-SEAC) is a patented, key differentiator of the NitroSecurity IPS solution. It allows enterprise customers the ability to collect and analyze threat information more efficiently and in an accurate and timely manner.
Tags : intrusion prevention, ips, n-seac, intrusion detection, ids, security management, nitrosecurity, nitro security
     NitroSecurity
By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : network security, intrusion prevention, hackers, hacker detection, ips, anr, nitro security, nitrosecurity
     NitroSecurity
By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : network security, intrusion prevention, security management, business management, information management, data security, preventsys, security
     Preventsys
By: Secure Computing     Published Date: Aug 21, 2009
Spyware presents a daily threat to organizations. It can even lead to networks being exposed to malicious attacks. Find out about the specific types of spyware threats that are out there and how you can combat these threats today.
Tags : security, internet security, anti spyware, intrusion prevention, intrusion detection, malware, anti virus, secure computing
     Secure Computing
By: Secure Computing     Published Date: Aug 21, 2009
Unknown attacks are quickly becoming the next great information security challenge for today's organizations. Get up to speed on what these threats really are and learn what security measures are available to keep your network safe from these attacks.
Tags : security, patch management, security management, web service security, malware, intrusion prevention, internet security, internet attacks
     Secure Computing
By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips
     Third Brigade
By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection
     Third Brigade
By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips
     Third Brigade
By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered
     TopLayer
By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime
     TopLayer
By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : network security, intrusion prevention, ips, cso, server protection, toplayer, top layer, security
     TopLayer
By: ArcSight     Published Date: Mar 04, 2009
This document will outline the requirements for an effective fraud mitigation solution. It will detail a solution that considers the entirety of an organization’s fraud mitigation strategy.
Tags : fraud, siem, arcsight, mitigating fraud, intrusion prevention systems, fraudsters, fraud policy, insider threats
     ArcSight
By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
     Cisco
By: Panda Security     Published Date: Feb 06, 2008
Today’s targeted malware attacks are infecting unsuspecting businesses at astonishing rates, rendering traditional antivirus solutions ineffective. Reported and known viruses are becoming less important compared to the increase in unknown threats and attacks.
Tags : security, threats, ips, intrusion prevention, internet security, hackers, hacker, virus
     Panda Security
By: Quocirca     Published Date: Feb 05, 2008
The financial services industry deals with a commodity that is primarily electronic — money. Consequently it spends more per employee on IT than any other industry.  Despite this, there is a worrying tendency for information that should be confidential to end up in the public domain. Why is this and what can be done?
Tags : quocirca, bank, banks, financial services, finserve, finserv, network security, customer data
     Quocirca
By: Microworld     Published Date: Dec 12, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
Tags : spam, email security, anti-spam, anti spam, email, intrusion prevention, mail scan, mailscan
     Microworld
By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion
     PassGo
By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation
     Netwrix
By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
     Technolytics
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics