ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention Research

  • How a next-generation firewall prevents application-layer attacks

    Sponsored by: SearchSecurity.com

    The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

  • SIM Technical Guide

    Sponsored by: SearchSecurity.com

    In this SearchSecurity.com Technical Guide on security information and event management (SIEM) systems, we explore the current state of SIEMs in the enterprise today and whether augmentation, cloud service, or rip and repair is your best upgrade option.

  • Mobile: The Technology Game-Changer in 2013

    Sponsored by: SearchSecurity.com

    TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    Sponsored by: SearchSecurity.com

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

  • The real need for distributed denial-of-service protection: How to stop DDoS attacks

    Sponsored by: SearchSecurity.com

    This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.

  • Remediating IT vulnerabilities: Quick hits for risk prioritization

    Sponsored by: SearchSecurity.com

    There's no way to eradicate all IT vulnerabilities, but the ability to spot critical ones is essential. This expert tip provides best practices to identify and prioritize vulnerabilities that will have the greatest impact and how to deploy limited resources in the most effective way.

  • Threat Detection (Antivirus Intrusion Prevention)

    Sponsored by: SearchSecurity.com

    Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.

  • Next-Generation IPS for Dummies

    Sponsored by: Sourcefire

    Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.

  • Assessing the Value of Cloud Security Threat Intelligence Services

    Sponsored by: Hewlett Packard Enterprise

    This expert E-Guide deep dives into what a global threat intelligence service is, how well the services perform and if they are worth the investment. Read on to learn more.

  • 2012 Endpoint Security Best Practices Survey Results

    Sponsored by: Symantec Corporation

    This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.

  • IBM Security Network Intrusion Prevention System

    Sponsored by: IBM

    This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more.

  • E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?

    Sponsored by: Dell SonicWALL

    Uncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.

  • E-Guide: Clearing Up the Confusion to Prepare for APTs

    Sponsored by: Dell SecureWorks

    Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.

  • Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs

    Sponsored by: Dell SonicWALL

    This is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.

  • Next Generation Firewalls: Assessing the Business/Technology Issue

    Sponsored by: Dell SonicWALL

    In the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.

  • HP TippingPoint: Next Generation Intrusion Prevention System

    Sponsored by: Hewlett Packard Enterprise

    Consult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company.

  • Solutions to Meet your PCI Compliance Needs

    Sponsored by: Hewlett Packard Enterprise

    Learn more about the capabilities of seven HP products in achieving Payment Card Industry (PCI) Data Security Standard (DSS) compliance. Ensure that compliance isn't a business inhibitor for your organization by consulting this informative resource.

  • Network Evolution: Building the Infrastructure to Enable the Changing Face of IT

    Sponsored by: OnX USA LLC

    This issue of Network Evolution from SearchNetworking.com explores how to accept and adopt BYOD into your enterprise while tackling the challenges it presents – namely providing secure access to your corporate assets.

  • Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers

    Sponsored by: Bit9, Inc.

    Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.

  • The Next Generation IPS

    Sponsored by: HP Enterprise Security

    Today’s organizations are faced with the growing challenge of advanced persistent threats (APTs). These attacks are more sophisticated and stealthier, using a variety of techniques to probe and gain access to high-value information. In this paper, uncover how to defend against APTs using a new innovative approach, Next Generation IPS.

  • Security considerations for small and medium-sized enterprises (SMEs)

    Sponsored by: GFI Software

    SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.

  • Stop strategies for preventing network intrusions

    Sponsored by: Dell SecureWorks

    This expert E-Guide will provide you with the steps, processes, and prevention methods to maintain a secure network within your industry.

  • E-Guide: How antivirus software works: Virus detection techniques

    Sponsored by: M86 Security

    Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.

  • Stopping Fake Antivirus: How to Keep Scareware off Your Network

    Sponsored by: Sophos

    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.

  • E-Guide: IT Security and Defence Strategies

    Sponsored by: Kaseya International Limited

    With so many security options and technologies available, how can you know which solution is best for your business needs? This e-guide provides a back to basics lesson on regular defense strategies and offers insight on buying considerations for an effective and reliable IT strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.