ComputerWeekly.com Research Library

Powered by Bitpipe.com

Host-Based Intrusion Prevention Systems (HIPS) Research

  • Adidas: IT Self-Service in Action

    Sponsored by: ServiceNow

    Learn how Adidas used ServiceNow® platforms to create a consumer-style shop to deliver services and increase efficiencies for its employees across 160 countries

  • Advanced Threat Detection: Discover Why 24x7 Monitoring is Critical

    Sponsored by: Arctic Wolf

    In a world where more than 50% of organizations take up to 214 days to detect threat activity, find out how to move beyond simply deploying protective measures by learning how to organize a timely, intelligence-based detection and response strategy.

  • AI: Beyond the hype

    Sponsored by: ComputerWeekly.com

    Artificial Intelligence is red hot. But what lies beyond the hype? Once it was big data, then cloud, now it is artificial intelligence, and that sub-set of it which is machine learning, that's generating more heat than light. Is there business value here?

  • AIOps Takes the Lead on Root Cause Analysis

    Sponsored by: ServiceNow

    Of all the recent developments in the IT operations sphere, automated root cause analysis is one that has many enterprises salivating. But despite the obvious interest around AIOps, many IT monitoring vendors are hesitant about jumping on the bandwagon. Keep reading to hear what you could stand to gain from AIOps.

  • Aligning Enterprise Identity and Access Management with CIO Priorities

    Sponsored by: SearchSecurity.com

    In this E-Guide from SearchSecurity.com, discover why aligning your identity and access management strategy with CIO priorities can help ensure this investment gets the funding you need.

  • Alleviate Technical Debt : A Practical Path to IT Modernization

    Sponsored by: Red Hat

    There are several core approaches you can take to advance your IT modernization efforts, which this white paper closely examines. Read on to view these four pragmatic methods for structuring your initiatives, as well as discover a viable first step for your modernization path: UNIX-to-Linux migration.

  • An Introduction to the Security Advantages of Mirco-Segmentation

    Sponsored by: VMware

    Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.

  • An Overview of Barracuda PhishLine

    Sponsored by: Barracuda

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Analysis of the Linux Audit System

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series identifies serious flaws due to architectural limitations of the Linux kernel which cast doubts on its ability to provide forensically sound audit records and discusses possible mitigation techniques.

  • Analyst Insights: Trends Driving the Need for a SOC-as-a-Service

    Sponsored by: Arctic Wolf

    This webcast examines the top cybersecurity challenges facing SMBs and explores how you can bolster your defenses against pernicious threats with a security operations center as a service (SOCaaS).

  • Analyst's take: Microsoft Dynamics CRM boosts customer service and company profits

    Sponsored by: ComputerWeekly.com

    Microsoft Dynamics CRM enables organizations to improve customer service, effectively manage marketing and communications, and increase sales productivity, ultimately driving increased profits and reduced costs.

  • Adapt Security for Hybrid Cloud Environments

    Sponsored by: Citrix

    In this expert e-guide, find out how you can overcome the security challenges of hybrid cloud, and learn about the organizational and cultural changes that accompany this shift in security.

  • Adapting to the new web security and email security threats

    Sponsored by: Cisco Systems, Inc.

    In this expert e-guide from SearchSecurity.com, industry leaders Karen Scarfone and Nick Lewis offer critical tips to securing email and Web use – given the latest advanced, targeted threats.

  • Adjusting a Continuous Monitoring Strategy to a Hybrid Era

    Sponsored by: LogRhythm, Inc.

    Your monitoring strategy is vital to keeping networks and data secure. Access this e-guide for IT security veteran Dave Shackleford's latest tips on how to factor the hybrid cloud variable into the security equation, particularly when it comes to aligning with the U.S. Department of Homeland Security Continuous Diagnostics and Mitigation framework.

  • Advanced Attacks Require Federal Agencies to Reimagine IT Security

    Sponsored by: FireEye

    This guide outlines the malware "kill-chain" model used in many of today's cyber-attacks and how these can overwhelm traditional security tools.

  • Advanced Identity Tracking for Social Networking Sites

    Sponsored by: Hewlett Packard Enterprise

    This resource details the methods used to assist social networking sites in identifying online predators and thwarting potentially serious attacks. View now to learn more!

  • Advanced identity tracking for social networking sites: Using HP ArcSight ESM to identify online predators

    Sponsored by: Hewlett Packard Enterprise

    This critical resource exposes the truth behind online predators using social networking sites to stalk intended victims without being detected by authorities. Click now to see how a correlation engine can help pinpoint these criminals before their next attack.

  • Advanced Malware Protection for your Email Services

    Sponsored by: Cisco Systems, Inc.

    This guide explores one company's unique advanced malware protection system and how it can provide you with cost-effective threat prevention for your email services.

  • Advanced Malware Protection for your Web and Email Gateways

    Sponsored by: Cisco Systems, Inc.

    This article explores the recent merger between one company's advanced malware protection and their web and email gateways.

  • Advanced Persistent Threat Detection: Can It Find Custom Malware?

    Sponsored by: UnitedLex

    A recent test showed that some well-known threat detection products were unable to detect custom-written malware samples thrown at them. Access this resource and find out if APT detection is an effective way to find custom malware, and why signature-based antimalware tools can't keep up with today's evolving security risks.

  • Advanced Persistent Threats: Detection, Protection and Prevention

    Sponsored by: Sophos

    Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.

  • Advanced Persistent Threats: Detection, Protection and Prevention

    Sponsored by: Sophos

    Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.

  • After the crisis: What now?

    Sponsored by: IBM

    To succeed in this new climate, you now need to take decisive action to preempt scarcity, drive cost efficiency and find targeted approaches to revenue growth. Read this executive report to find out how.

  • Agile IT Helps Customers Choose Aviva Health

    Sponsored by: IBM

    Aviva Health found itself hampered by an ageing and inflexible IT environment and a complex set of highly manual processes. In partnership with IBM, Aviva UK Health designed and built an agile, dynamic solution which is now being rolled out to other areas of the business. Access this case study now for a detailed look at this transition.

  • AlienVault Unified Security Management: Complete Security Visibility

    Sponsored by: AT&T Cybersecurity

    AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.