ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • Debunking APT myths: What it really means and what you can do about it

    Sponsored by: TechTarget Security

    This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats.

  • IT Decision Checklist: Messaging Security

    Sponsored by: TechTarget Security

    Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.

  • Symantec Endpoint Protection 12

    Sponsored by: Symantec Corporation

    Symantec Endpoint Protection 12 is built around an idea; that the context of a threat is as important as its content. Powered by Insight, the new Symantec Endpoint Protection uses age, frequency and source of files, along with other security metrics, to expose new and highly targeted threats.

  • iSensor specifications

    Sponsored by: DellEMC and Intel®

    Organizations need advanced security technology, strong security expertise and 24x7 vigilance to safeguard their networks and IT systems. This data sheet offers an overview and specifications of Dell SecureWorks’ proprietary network intrusion prevention appliance, iSensor. Learn about its key features and how it can protect your networks.

  • Intrusion prevention service with iSensor

    Sponsored by: DellEMC and Intel®

    Anti-virus and firewalls technologies are not enough to protect your business from emerging threats. Discover an advanced security solution that offers intrusion prevention services to help monitor your network and deliver exceptional threat protection. Read this paper to learn how to stay ahead of the latest threats and secure your networks.

  • Cybersecurity Readiness Study: An Executive Summary

    Sponsored by: ArcSight, an HP Company

    This study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.

  • IDS vs. IPS

    Sponsored by: Sourcefire

    When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.

  • Magic Quadrant for Mobile Data Protection

    Sponsored by: Sophos

    This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  • Top 5 Threat Protection Best Practices

    Sponsored by: Sophos

    The following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.

  • Five tips to reduce risk from modern web threats

    Sponsored by: Sophos

    User education and awareness, preventive measures and a modern web security solution are all integral components of a comprehensive defense against today’s web threats. This guide covers some essential preventive measures you should implement to reduce your risk and keep ahead of the threats as much as possible.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: IBM

    In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.

  • Intelligent real-time protection and application control

    Sponsored by: SonicWALL

    It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network.

  • Next-generation capabilities of enterprise application-aware firewalls

    Sponsored by: SonicWALL

    The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.

  • SuperMassive E10000 Series Next-Generation Firewall

    Sponsored by: SonicWALL

    The SonicWALL® SuperMassive™ E10000 Series is SonicWALL’s Next-Generation Firewall platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds.

  • Next-Generation Firewall

    Sponsored by: SonicWALL

    It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.

  • SonicWALL TZ Series

    Sponsored by: SonicWALL

    Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls.

  • E-Guide: Monitoring Strategies for Insider Threat Detection

    Sponsored by: ArcSight, an HP Company

    Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.

  • E-Guide: Enterprise UTM Security: The Best Threat Management Solution?

    Sponsored by: NETGEAR Inc.

    If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.

  • Understanding WMI Malware

    Sponsored by: Trend Micro, Inc.

    This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.

  • Take Back Control: Increase Security, Empower Employees, Protect the Business

    Sponsored by: WatchGuard Technologies, Inc.

    Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.

  • Lumension Endpoint Security: Device Control and Application Control

    Sponsored by: Lumension

    The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.

  • First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies

    Sponsored by: ArcSight, an HP Company

    The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.

  • Four Principles of Effective Threat Protection: Defining the right strategy and tools to defend your business against malware

    Sponsored by: Sophos

    Threat protection requires an updated approach now that the classic model of anti-virus plus firewall is no longer enough. Best practice calls for interlocking layers of protection that support your business processes and digital assets. Read on to learn principles you can use to strike a balance between enabling business and ensuring security.

  • Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’

    Sponsored by: Information Security Magazine

    This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.

  • The New Face of Intrusion Prevention

    Sponsored by: Check Point Software Technologies Ltd.

    Check Point IPS Software Blade gives breakthrough performance and protection at a breakthrough price. For more details, check out this paper, which highlights the numerous benefits of Check Point intrusion prevention protection solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.