Intrusion Prevention Research
-
Information Security Essential Guide: The Evolution of Threat Detection and Management
Sponsored by: TechTarget SecurityThis Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
-
Targeted attacks: Preparation and Mitigation
Sponsored by: TechTarget SecurityThis expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
-
Retail Cyber Crime
Sponsored by: LogRhythm, Inc.This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
-
NSS Labs 2013 Network IPS Comparative Analysis
Sponsored by: IBMThis resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
-
Evaluating the True Impact of Fraud on Financial Institution
Sponsored by: IBMThis guide makes an effective business case for fraud-prevention technology and evaluates the true impact of fraud on various financial institutions.
-
Advanced Persistent Threats: Detection, Protection and Prevention
Sponsored by: SophosDownload this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
-
Magic Quadrant for Intrusion Prevention Systems
Sponsored by: SourcefireThis guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
-
Unified Security Management: Real-time Threat Detection
Sponsored by: AT&T CybersecurityThis free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
-
Manage Data Security and Application Threats with a Multi-Tiered Approach
Sponsored by: IBMThis resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
-
Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
Sponsored by: DellEMC and Intel®This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
-
NSS Labs Network Intrusion Prevention System Product Analysis
Sponsored by: IBMThis resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
-
Supporting the Zero Trust Model of Information Security
Sponsored by: IBMThis Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
Endpoint Protection Platforms for Enterprises
Sponsored by: Symantec CorporationThis guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
-
How to Properly Secure Your Organization: Evolving Your Threat-Detection Techniques and Endpoint Security Strategy
Sponsored by: Bit9, Inc.Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.
-
September Information Security Magazine
Sponsored by: TechTarget SecurityIndustry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
-
SuperMassive Series data sheet
Sponsored by: Dell SoftwareThe Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
-
Is Your Platform Secure? Really?
Sponsored by: IBMThis resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
-
Practitioners Guide to Establishing a SOC Webinar
Sponsored by: AT&T CybersecurityThis AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
-
Practitioner's Guide to Establishing an SOC
Sponsored by: AT&T CybersecurityThis white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
-
A CIO's Five-Point Plan for Managing Endpoint Security
Sponsored by: Dell KACEManaging endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
Sponsored by: ImpervaIn this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
-
IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
Sponsored by: OpenText Security SolutionsIn this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
-
Gartner Magic Quadrant for Unified Threat Management
Sponsored by: SophosRead an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
-
Threat Detection (Antivirus Intrusion Prevention)
Sponsored by: TechTarget SecurityAntivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.