ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Detection Research

  • IT Decision Checklist: Messaging Security

    Sponsored by: TechTarget Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

  • E-Guide: How antivirus software works: Virus detection techniques

    Sponsored by: M86 Security

    Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.

  • Stopping Fake Antivirus: How to Keep Scareware off Your Network

    Sponsored by: Sophos

    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.

  • E-Guide: IT Security and Defence Strategies

    Sponsored by: Kaseya International Limited

    With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.

  • Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems

    Sponsored by: Dell SecureWorks

    View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.

  • Information Security IT Decision Checklist: Security Information and Event Management

    Sponsored by: ArcSight, an HP Company

    This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.

  • How to collect Windows Event logs to detect a targeted attack

    Sponsored by: M86 Security

    Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.

  • GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware

    Sponsored by: GlobalSign

    This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.

  • Cybersecurity Readiness Study: An Executive Summary

    Sponsored by: ArcSight, an HP Company

    This study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.

  • IDS vs. IPS

    Sponsored by: Sourcefire

    When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.

  • Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It

    Sponsored by: Google Apps

    Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.

  • Alternatives for Securing Virtual Networks

    Sponsored by: Juniper Networks, Inc.

    In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: IBM

    In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

  • E-Guide: Why attackers exploit multiple zero-day attacks and how to respond

    Sponsored by: ESET

    The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.

  • Next-generation capabilities of enterprise application-aware firewalls

    Sponsored by: SonicWALL

    The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.

  • Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It

    Sponsored by: Google Apps

    Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: ArcSight, an HP Company

    Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.

  • Understanding WMI Malware

    Sponsored by: Trend Micro, Inc.

    This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.

  • Your September Issue of Information Security Magazine– Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.

  • First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies

    Sponsored by: ArcSight, an HP Company

    The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

  • Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’

    Sponsored by: Information Security Magazine

    This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  • Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities

    Sponsored by: IBM

    Security managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal. Read on to learn more.

  • Enhance Security with Intel® vPro™ Technology

    Sponsored by: Intel Corporation

    Security and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.

  • Firewall Solutions for Small Business

    Sponsored by: Cisco Systems, Inc.

    The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.

  • The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs

    Sponsored by: SonicWALL

    This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.