ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • AI: Beyond the hype

    Sponsored by: ComputerWeekly.com

    Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?

  • AI: The Latest IT Tool

    Sponsored by: ServiceNow

    It's important for IT professionals like yourself to know how to distinguish the good AI tools from the bad. That's where this E-Guide should come in handy. Download this E-Guide to learn how artificial intelligence capabilities are augmenting the day-to-day IT tools you're most familiar with.

  • AIOps Applications in Containers, Monitoring, and More.

    Sponsored by: ServiceNow

    Download this E-Guide to learn why AIOps has quickly becoming a central tool within modern IT departments’ arsenals, and how AIOps tools are being used in areas like container monitoring, proactive resolutions, and more.

  • Aligning Cyber Risk Management with Business Performance

    Sponsored by: Coalfire

    Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.

  • Aligning Enterprise Identity and Access Management with CIO Priorities

    Sponsored by: SearchSecurity.com

    In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.

  • All Clouds are not Equal

    Sponsored by: Forcepoint

    Nowadays, organizations turn to the cloud for nearly every business capability, security included. However, despite the clear advantages of cloud-based security, certain misconceptions exist. Read this e-book for a breakdown of 5 common misconceptions and discover what to look for in a cloud-based security solution.

  • All Good Remediation Strategies Begin with Collaboration

    Sponsored by: Vulcan

    As cyberattacks grow more frequent as a result of environments becoming more complex, it’s more important than ever for disparate security efforts to be unified under a cohesive strategy. This blog post highlights the benefits of a collaborative remediation approach and offers best practices for cultivating a collaborative remediation culture.

  • Alleviate Technical Debt : A Practical Path to IT Modernization

    Sponsored by: Red Hat

    There are several core approaches you can take to advance your IT modernization efforts, which this white paper closely examines. Read on to view these four pragmatic methods for structuring your initiatives, as well as discover a viable first step for your modernization path: UNIX-to-Linux migration.

  • An Ideal Match with Analyst's SOAR Recommendations

    Sponsored by: Palo Alto Networks

    According to Gartner, the ‘ideal’ SOAR solution is defined by the convergence of security orchestration and automation, incident response, and threat intelligence. These capabilities are native to the Cortex XSOAR platform – but does that make it ideal? Read this data sheet to see how Cortex XSOAR stacks up to Gartner’s recommendations.

  • An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context

    Sponsored by: Delve

    To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • An Overview of Insider Threat Management

    Sponsored by: Proofpoint

    The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.

  • Analysis of the Linux Audit System

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.

  • Analyst Report: Governance, Risk, And Compliance Platforms, Q1 2020

    Sponsored by: ServiceNow

    In this most recent edition of The Forrester Wave: Governance, Risk and Compliance Platforms, industry experts at Forrester identify and evaluate 12 key GRC platform providers, how they compare to each other, and offers key insights into emerging market trends. Download this report to leverage Forrester’s GRC expertise.

  • Analyst's take: Microsoft Dynamics CRM boosts customer service and company profits

    Sponsored by: ComputerWeekly.com

    Microsoft Dynamics CRM enables organizations to improve customer service, effectively manage marketing and communications, and increase sales productivity, ultimately driving increased profits and reduced costs.

  • Application Control and Critical Infrastructure Protection

    Sponsored by: VMware International Unlimited Company

    Reducing unscheduled downtime of critical systems as a result of a cyberattacks should be at the top of every organization’s security to-do list for this year. VMware Carbon Black wants to help. Read this data sheet to learn about their App Control offering, designed to eliminate unplanned downtime and protect critical systems at scale.

  • AIOps Takes the Lead on Root Cause Analysis

    Sponsored by: ServiceNow

    Of all the recent developments in the IT operations sphere, automated root cause analysis is one that has many enterprises salivating. But despite the obvious interest around AIOps, many IT monitoring vendors are hesitant about jumping on the bandwagon. Keep reading to hear what you could stand to gain from AIOps.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • Analyzing Four Widely Exploited Java Vulnerabilities

    Sponsored by: FireEye

    This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.

  • Anittel Simplifies Managed Antivirus Service Case Study

    Sponsored by: Webroot

    This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.

  • Antivirus: The Hippest New Apple Accessory

    Sponsored by: Threat Track Security

    For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.

  • Application Development Security Requires Forethought

    Sponsored by: tCell

    Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.

  • Application Development Security Requires Forethought

    Sponsored by: Veracode, Inc.

    Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.