ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • Firewall Solutions for Small Business

    Sponsored by: Cisco Systems, Inc.

    The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.

  • The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs

    Sponsored by: SonicWALL

    This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.

  • Presentation Transcript: Endpoint security fundamentals

    Sponsored by: Sophos

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • Information Security Magazine, May 2009: Automating Compliance

    Sponsored by: Information Security Magazine

    This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.

  • Data Breach Case Study: Heartland Payment Systems

    Sponsored by: Sourcefire

    Read this case study to learn how Sourcefire's solutions can help top credit and debit card processors, as well as companies completing far fewer online transactions, in protecting sensitive customer data from cybercriminals.

  • Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management

    Sponsored by: IBM

    This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.

  • Symantec Endpoint Protection 11.0.3

    Sponsored by: Symantec Corporation

    In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.

  • Security Appliances: New Strides in Preventing Intrusions

    Sponsored by: IBM

    According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.

  • IBM Security Event and Log Management Service

    Sponsored by: IBM

    With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.

  • Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved

    Sponsored by: MarkMonitor

    This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.

  • Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months

    Sponsored by: MarkMonitor

    Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.

  • Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management

    Sponsored by: Juniper Networks, Inc.

    Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.

  • Cisco ASA 5500 Series Adaptive Security Appliance

    Sponsored by: Cisco Systems, Inc.

    In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.

  • Managed SSL VPN Remote Access

    Sponsored by: Virtela Communications, Inc.

    Virtela's SSL VPN Remote Access Services provide end-users the security of a completely encrypted network with the flexibility to access resources from any SSL enabled browser.

  • Cisco PIX 501 Security Appliance

    Sponsored by: Cisco Systems, Inc.

    The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance.

  • The Cybercrime Arms Race

    Sponsored by: Kaspersky

    Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.

  • Drive business value with innovation for security defense

    Sponsored by: IBM

    This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.

  • 7 Key Factors to Software Protection

    Sponsored by: Arxan

    This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.

  • GFI LANguard Security Event Log Monitor - Downloads

    Sponsored by: GFI Software

    GFI LANguard S.E.L.M. ships with a security event analysis engine which takes into account the type of security event, security level of each computer, when event occurred, role of computer and its operation system.

  • Deploying GFI LANguard S.E.L.M.

    Sponsored by: GFI Software

    This white paper gives an overview of how GFI LANguard S.E.L.M. works and discusses installation and deployment issues, enabling you to choose the best way to deploy the product on your network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.