HR Hero Your Employment Law Resource
 

intrusion prevention

Results 51 - 75 of 122Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
Gartner, Inc. has positioned McAfee as a Leader in the Gartner Magic Quadrant for Intrusion Prevention Systems (IPS) for the tenth consecutive time. With the shift to cloud-based architectures, the role of IPS is changing. Get access to this valuable Gartner research, $1,995.00 USD value, compliments of McAfee.
Tags : 
gartner mq, gartner magic quadrant, intrusion prevention systems, vips, ips, magic quadrant ips
    
McAfee
Published By: Proofpoint     Published Date: May 17, 2017
In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.
Tags : 
proofpoint, ransomware, intrusion prevention, cyberattack, data protection
    
Proofpoint
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security, trust zones, new access layer, high value targets, inspection offload, virtual ips, security management, threat coverage, ips platfrom, r&d servers, virtualized data centers, denial of service (dos), intrusion prevention system
    
HP
Published By: McAfee     Published Date: Nov 14, 2012
Real-Time Database Monitoring, Auditing, and Intrusion Prevention Databases store an enterprise's most valuable information assets, but in most organizations they are poorly protected. It's common sense to secure databases, but it's not that simple.
Tags : 
database monitoring, auditing, intrusion prevention, database, mcafee
    
McAfee
Published By: Lumension     Published Date: Jun 05, 2015
Microsoft withdraws support for Windows Server 2003 on July 14, 2015. Here’s how you need to respond to protect your organization’s information assets. Just after enterprises have finished migrating their desktops from Microsoft Windows XP, they now have to turn around and move away from Windows Server 2003. The venerable (and now vulnerable) operating system reaches end of support on July 14, 2015. But many companies will continue to use the software after that deadline, and that has serious security implications.
Tags : 
security, patch, data, regulatory compliance, application security, compliance, intrusion prevention, database development
    
Lumension
Published By: IBM     Published Date: Feb 11, 2015
Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.
Tags : 
intrusion prevention, ibm, appliance market, ips, network traffic
    
IBM
Published By: IBM     Published Date: Apr 09, 2015
Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.
Tags : 
magic quadrant, ibm, intrusion prevention systems, security, security risk, data security
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This paper evaluates the market’s readiness for Zero Trust concepts and technologies, based on Forrester’s own market data and a custom study of the same audience.
Tags : 
intrusion prevention system, encrypted tunnels, it security, security management, network analysis, visibility capabilities
    
IBM
Published By: IBM     Published Date: Jan 07, 2016
IBM Security Network Protection (XGS) is a next-generation intrusion prevention appliance that uses behavior-based analysis instead of pattern matching to help identify and block unknown threats.
Tags : 
ibm, networks, security, threats, protection, intrusion prevention
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems, ips, gartner
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: Focus     Published Date: Nov 15, 2011
Learn the 9 most critical factors all small to medium-size businesses should know about data network security.
Tags : 
network, security, network security, attacks, intrusion, intrusion prevention, security, data network, smb
    
Focus
Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention
    
Arbor Networks
Published By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : 
code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
    
Symantec
Published By: McAfee     Published Date: Oct 10, 2013
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques
    
McAfee
Published By: McAfee     Published Date: Nov 11, 2013
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques
    
McAfee
Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention, malware, cyberattack
    
Kaspersky
Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security, penetration testing, intrusion prevention
    
Rapid7
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks
    
Arbor Networks
Published By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
    
Viavi Solutions
Published By: AlienVault     Published Date: Aug 12, 2016
UW-Superior’s IT team was looking to replace their outdated intrusion prevention system. After a full evaluation of AlienVault’s Unified Security Management™ (USM) platform, they decided to leverage it to meet their IDS needs. As the team became familiar with using AlienVault USM as their intrusion detection system, they began to implement the other tools that make up the USM platform. They realized that because so many security features were already included in USM, like behavioral monitoring, SIEM and vulnerability assessment, they would not have to purchase additional security tools that they previously thought they would need.
Tags : 
    
AlienVault
Published By: AirDefense     Published Date: Apr 24, 2007
This white paper will explore what security challenges wireless networks present, suggest best practices to ensure Wireless LAN security, and demonstrate how AirDefense Enterprise, a Wireless Intrusion Detection and Prevention System, can help you define, monitor and enforce your wireless security policy.
Tags : 
best practices, sox, sarbanes-oxley, sarbanes oxley, sarbox, compliance, wireless security, wlan, wlan security, ids, intrusion prevention, intrusion detection, security policy, wireless security policy, airdefense
    
AirDefense
Published By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : 
hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11, wireless lan, monitoring, airdefense
    
AirDefense
Published By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : 
wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks
    
AirTight Networks
Start   Previous    1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.