Intrusion Detection White Papers
-
The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
Sponsored by: SonicWALLThis brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
-
Information Security Magazine, May 2009: Automating Compliance
Sponsored by: Information Security MagazineThis month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
-
IBM Security Event and Log Management Service
Sponsored by: IBMWith Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
-
Security Appliances: New Strides in Preventing Intrusions
Sponsored by: IBMAccording to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
-
Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
Sponsored by: MarkMonitorThis white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
-
Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
Sponsored by: MarkMonitorNationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
-
Getting the Most from Your Wireless Network
Sponsored by: WildPackets, Inc.Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee.
-
Unified Threat Management: The Best Defense against Blended Threats
Sponsored by: SonicWALLThe SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
-
The Cybercrime Arms Race
Sponsored by: KasperskyRead this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
-
Drive business value with innovation for security defense
Sponsored by: IBMThis white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
-
Automated Penetration Testing; Can IT Afford Not To?
Sponsored by: Core Security TechnologiesThis paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
-
Enterprise-Grade Wireless LAN Security
Sponsored by: SiemensThis white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.