Host Intrusion Detection Reports

IT Decision Checklist: Messaging Security
sponsored by TechTarget Security
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

TechTarget Security

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AT&T Cybersecurity

Next Generation Firewalls: Assessing the Business/Technology Issue
sponsored by Dell SonicWALL
EGUIDE: In the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

DellEMC and Intel®

Intrusion Detection and Prevention: Decision Time
sponsored by TechTarget Security
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

TechTarget Security

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

E-Guide: IT Security and Defence Strategies
sponsored by Kaseya International Limited
EGUIDE: With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.
Posted: 30 Aug 2011 | Published: 30 Aug 2011

Kaseya International Limited

Threat Detection (Antivirus Intrusion Prevention)
sponsored by TechTarget Security
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Security

CounterTack Active Forensics: Continuous Network Monitoring for In-Progress Attacks
sponsored by CounterTack
WHITE PAPER: The security tools and strategies in use today are not enough to fight off APTs. Organizations need a new level of security that enables them to actively engage with attackers and take control of the impact of an attack in progress. Uncover how meet these needs with an active forensic system that provides better visibility and intelligence.
Posted: 22 Jun 2012 | Published: 22 Jun 2012

CounterTack