ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical

    Sponsored by: Arctic Wolf

    In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.

  • AI: Beyond the hype

    Sponsored by: ComputerWeekly.com

    Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?

  • AIOps Takes the Lead on Root Cause Analysis

    Sponsored by: ServiceNow

    Of all the recent developments in the IT operations sphere, automated root cause analysis is one that has many enterprises salivating. But despite the obvious interest around AIOps, many IT monitoring vendors are hesitant about jumping on the bandwagon. Keep reading to hear what you could stand to gain from AIOps.

  • AlienVault USM vs SIEM

    Sponsored by: AT&T Cybersecurity

    Like any other security program, SIEM was helpful at detecting threats for a time. When new compliance regulations began requiring data records, SIEM became unable to handle the increased volume. This white paper highlights the shortcomings of SIEM and explores AlienVault’s Unified Security Management (USM) platform. Read on to learn more.

  • Aligning Enterprise Identity and Access Management with CIO Priorities

    Sponsored by: SearchSecurity.com

    In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Analysis of the Linux Audit System

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.

  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service

    Sponsored by: Arctic Wolf

    This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).

  • Analyst's take: Microsoft Dynamics CRM boosts customer service and company profits

    Sponsored by: ComputerWeekly.com

    Microsoft Dynamics CRM enables organizations to improve customer service, effectively manage marketing and communications, and increase sales productivity, ultimately driving increased profits and reduced costs.

  • Application Shielding First Line of Defense for Financial Apps

    Sponsored by: Intertrust

    In this webinar, join Paul Butterworth, the Director of Product Marketing at Intertrust, as he discusses the risks your financial applications face, best practices for protecting applications, IP and keys and explore some real-world examples from financial services.

  • Architecting End User Computing Solutions

    Sponsored by: Nutanix

    What are the possible infrastructures at your disposal that will streamline and simplify EUC project completion? Download this e-book to view several options for VDI and EUC environments, and to learn how to implement them in your organization, such as converged infrastructure, hyper-converged infrastructure, and more.

  • Advanced Persistent Threats: Detection, Protection and Prevention

    Sponsored by: Sophos

    Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.

  • Advanced Persistent Threats: Detection, Protection and Prevention

    Sponsored by: Sophos

    Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.

  • After the crisis: What now?

    Sponsored by: IBM

    To succeed in this new climate, you now need to take decisive action to preempt scarcity, drive cost efficiency and find targeted approaches to revenue growth. Read this executive report to find out how.

  • Agile IT Helps Customers Choose Aviva Health

    Sponsored by: IBM

    Aviva Health found itself hampered by an ageing and inflexible IT environment and a complex set of highly manual processes. In partnership with IBM, Aviva UK Health designed and built an agile, dynamic solution which is now being rolled out to other areas of the business. Access this case study now for a detailed look at this transition.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

  • Analyzing Four Widely Exploited Java Vulnerabilities

    Sponsored by: FireEye

    This informative guide explores the technical details of the 4 most common Java vulnerabilities and outlines each step of the infection flow.

  • Anittel Simplifies Managed Antivirus Service Case Study

    Sponsored by: Webroot

    This case study explores the antivirus system a managed service provider adopted that helped them thwart malware infections, reduce scan times, and ease the burden on IT administration.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.

  • Antivirus: The Hippest New Apple Accessory

    Sponsored by: Threat Track Security

    For organizations that have deployed fleets of Macs and iPads/iPhones, protecting sensitive data and intellectual property can be challenging. This resource demonstrates why it is critical that security administrators need antivirus software for their Macs and MDM tools for their iPads and iPhones.

  • Application Development Security Requires Forethought

    Sponsored by: Veracode, Inc.

    Learn how RASP, or runtime application self-protection, could be the answer to prevent vulnerabilities from slipping through the web app review process and block new, unforeseen threats.

  • Application Development Security Requires Forethought

    Sponsored by: tCell

    Learn how to define security requirements at the beginning, and what can be learned from the RASP approach in closing the gap left by application security testing.

  • APT Defense Mechanisms and Best Practices

    Sponsored by: Infoblox

    Uncover the devastating affects advanced persistent threats (APTs) can have on your systems and learn a number of best practices that can help you defend against them.

  • APT-Style Attacks: How Cybercriminals are Using Them

    Sponsored by: WatchGuard Technologies, Inc.

    New research shows cybercriminals are using more advanced attack techniques. In this e-guide, security expert Nick Lewis explains what enterprises need to know about the APT-style attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.