ComputerWeekly.com Research Library

Powered by Bitpipe.com

Intrusion Prevention White Papers

  • Infographic: 4 types of ransomware

    Sponsored by: TechTarget ComputerWeekly.com

    Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.

  • How to Improve Your Security Incident Response Process

    Sponsored by: ServiceNow

    Nearly every day there's a new headline about one high-profile data breach or another. But there are many more incidents that go unnoticed because organizations don't know how to detect them. In this e-guide, learn how to detect key symptoms that signal a problem. Also, explore tips to help you better respond to these incidents.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • The Benefits of Automating Security with SOAR Tools

    Sponsored by: ServiceNow

    Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.

  • Incident Response Tools: How, When & Why to Use Them

    Sponsored by: Claranet

    Incident response tools are growing in popularity as an effective method for proactively analyzing and addressing the vulnerabilities within your network. This e-guide was written to help readers through the vetting process as well as understand how, when and why to use them – read on to get started.

  • How to Prevent Cloud Cryptojacking Attacks on your Enterprise

    Sponsored by: Cisco Umbrella

    Cloud cryptojacking attacks are a newer threat targeting enterprises. Cybersecurity expert Rob Shapland – an ethical hacker who specializes in simulating advanced cyberattacks against corporate networks – explains what safeguards you should have in place to prevent these attacks.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • The Future of Security: Advanced Security Analytics

    Sponsored by: LogRhythm, Inc.

    As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.

  • Information Security Asean July 2016

    Sponsored by: TechTarget Security

    In April, the Philippines suffered its worst-ever government data breach, when personal information, including fingerprint data and passport information, belonging to around 70 million people, were compromised.

  • Information Security ANZ July 2016

    Sponsored by: TechTarget Security

    Australia's $230m security strategy serves as a wake-up call to enterprises about the need to take the issue much more seriously.

  • Information Security ANZ March 2016

    Sponsored by: TechTarget

    Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly

  • Information Security ANZ July 2015

    Sponsored by: TechTarget

    Analysts and security experts discuss the current risk factors in the ANZ region.

  • Five Critical Steps to Achieving an Effective Application Security Program

    Sponsored by: IBM

    Discover steps you can incorporate into every phase of the development process to improve your application security, and get an overview of application threats and the types of risks to prioritize and remediate.

  • Intrusion Detection and Prevention: Decision Time

    Sponsored by: TechTarget Security

    Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.

  • Intrusion Detection and Prevention: RFP Technology Decisions

    Sponsored by: TechTarget Security

    To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.

  • Intrusion Detection and Protection: From Business Problem to Technical Solution

    Sponsored by: TechTarget Security

    Learn how IDS/IPS help you thwart attacks and mitigate post-attack damage.

  • Vendor Landscape: Intrusion Detection and Prevention Systems

    Sponsored by: IBM

    This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.

  • Security for a Faster World

    Sponsored by: Hewlett Packard Enterprise

    This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.

  • Advanced Persistent Threats: Detection, Protection and Prevention

    Sponsored by: Sophos

    Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.

  • HP TippingPoint Provides Next-Generation Network Security

    Sponsored by: Hewlett Packard Enterprise

    This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.

  • The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint

    Sponsored by: Hewlett Packard Enterprise

    This case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Multi Stage Filtering

    Sponsored by: APCON, Inc.

    This informative guide explores the current challenges networks face when it comes to increased traffic and how effective packet filtering can help you.

  • Detecting and Preventing Retail Cyber Crime

    Sponsored by: LogRhythm, Inc.

    Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.

  • Retail Cyber Crime

    Sponsored by: LogRhythm, Inc.

    This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.