Intrusion Detection Research
-
Information Security Essential Guide: The Evolution of Threat Detection and Management
Sponsored by: TechTarget SecurityThis Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
-
Targeted attacks: Preparation and Mitigation
Sponsored by: TechTarget SecurityThis expert e-guide explains how you can make an effective business case for targeted attack defense. Also inside, discover what you need to know in order to change user behaviors as part of your risk mitigation strategy.
-
How a next-generation firewall prevents application-layer attacks
Sponsored by: TechTarget SecurityThe application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
-
Mobile: The Technology Game-Changer in 2013
Sponsored by: TechTarget SecurityTechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
-
Threat Management: Devising a new strategy to tackle today's cyberattacks
Sponsored by: TechTarget SecurityThis Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
-
Overcoming APT and Today’s Sophisticated Malware
Sponsored by: TechTarget SecurityIn this e-guide from SearchSecurity.com, hear from experts as they discuss the dangers behind malware and APT attacks and offer effective virus detection techniques to help you address them.
-
Manage Data Security and Application Threats with a Multi-Tiered Approach
Sponsored by: IBMThis resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
-
Endpoint Protection Platforms for Enterprises
Sponsored by: Symantec CorporationThis guide explores a unique enterprise endpoint protection platform that encompasses a multitude of security tools.
-
How to Properly Secure Your Organization: Evolving Your Threat-Detection Techniques and Endpoint Security Strategy
Sponsored by: Bit9, Inc.Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.
-
AlienVault Unified Security Management: Complete Security Visibility
Sponsored by: AT&T CybersecurityAlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
-
Is Your Platform Secure? Really?
Sponsored by: IBMThis resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
-
Practitioners Guide to Establishing a SOC Webinar
Sponsored by: AT&T CybersecurityThis AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
-
Quick Dirty Dozen PCI Compliance Simplified
Sponsored by: AT&T CybersecurityMaintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
-
Practitioner's Guide to Establishing an SOC
Sponsored by: AT&T CybersecurityThis white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
Sponsored by: ImpervaIn this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
-
IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
Sponsored by: OpenText Security SolutionsIn this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
-
Threat Detection (Antivirus Intrusion Prevention)
Sponsored by: TechTarget SecurityAntivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
-
Assessing the Value of Cloud Security Threat Intelligence Services
Sponsored by: Hewlett Packard EnterpriseThis expert E-Guide deep dives into what a global threat intelligence service is, how well the services perform and if they are worth the investment. Read on to learn more.
-
2012 Endpoint Security Best Practices Survey Results
Sponsored by: Symantec CorporationThis informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
-
IBM Security Network Intrusion Prevention System
Sponsored by: IBMThis 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.
-
E-Guide: Clearing Up the Confusion to Prepare for APTs
Sponsored by: Dell SecureWorksConsult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.
-
Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
Sponsored by: Dell SonicWALLThis is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
-
Next Generation Firewalls: Assessing the Business/Technology Issue
Sponsored by: Dell SonicWALLIn the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.
-
HP TippingPoint: Next Generation Intrusion Prevention System
Sponsored by: Hewlett Packard EnterpriseConsult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company.
-
CounterTack Active Forensics: Continuous Network Monitoring for In-Progress Attacks
Sponsored by: CounterTackThe security tools and strategies in use today are not enough to fight off APTs. Organizations need a new level of security that enables them to actively engage with attackers and take control of the impact of an attack in progress. Uncover how meet these needs with an active forensic system that provides better visibility and intelligence.