Intrusion Detection Research
-
E-Guide: IT Security and Defence Strategies
Sponsored by: Kaseya International LimitedWith so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.
-
Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
Sponsored by: Dell SecureWorksView this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
-
Information Security IT Decision Checklist: Security Information and Event Management
Sponsored by: ArcSight, an HP CompanyThis Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.
-
How to collect Windows Event logs to detect a targeted attack
Sponsored by: M86 SecurityTargeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
-
GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
Sponsored by: GlobalSignThis paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
-
Cybersecurity Readiness Study: An Executive Summary
Sponsored by: ArcSight, an HP CompanyThis study by Ponemon Institute will cover the development of cyber attacks and the development of security systems that can prevent an detect these attacks. It will also tell you when organizations are doing to counter these threats and how you can find out if your organization is prepared for these threats.
-
IDS vs. IPS
Sponsored by: SourcefireWhen it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
-
Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
Sponsored by: Google AppsToday's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
-
Alternatives for Securing Virtual Networks
Sponsored by: Juniper Networks, Inc.In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks.
-
E-Guide: Monitoring Strategies for Insider Threat Detection
Sponsored by: IBMIn this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
-
E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
Sponsored by: ESETThe Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
-
Next-generation capabilities of enterprise application-aware firewalls
Sponsored by: SonicWALLThe emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.
-
Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
Sponsored by: Google AppsToday's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
-
E-Guide: Monitoring Strategies for Insider Threat Detection
Sponsored by: ArcSight, an HP CompanyInsider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
-
Understanding WMI Malware
Sponsored by: Trend Micro, Inc.This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.
-
Your September Issue of Information Security Magazine– Readers’ Choice Awards
Sponsored by: Information Security MagazineIn this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold.
-
First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
Sponsored by: ArcSight, an HP CompanyThe purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
-
Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’
Sponsored by: Information Security MagazineThis month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.
-
IT Decision Checklist: Messaging Security
Sponsored by: TechTarget SecurityRead this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
-
Staying a step ahead of the hackers: the importance of identifying critical Web application vulnerabilities
Sponsored by: IBMSecurity managers may work for midsize or large organizations; they may operate from anywhere on the globe. But inevitably, they share a common goal: to better manage the risks associated with their business infrastructure. Increasingly, Web application security plays a significant role in achieving that goal. Read on to learn more.
-
Enhance Security with Intel® vPro™ Technology
Sponsored by: Intel CorporationSecurity and compliance are strong values even in a down economy. Hear from a variety of clients that have used Intel® vPro™ Technology to identify problems, disable and enable the network, enhance patch management, and enabled them to isolate threats quickly and efficiently.
-
Firewall Solutions for Small Business
Sponsored by: Cisco Systems, Inc.The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.
-
The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
Sponsored by: SonicWALLThis brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
-
Information Security Magazine, May 2009: Automating Compliance
Sponsored by: Information Security MagazineThis month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
-
IBM Security Event and Log Management Service
Sponsored by: IBMWith Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.