Intrusion Detection/ ForensicsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsIntrusion Detection/ Forensics  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 178 | Next Page

The future of digital forensics by ComputerWeekly.com

April 10, 2014 - (Free Research)
This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Equifax: Protecting Consumer and Business Information with Advanced Threat Protection by IBM

June 03, 2013 - (Free Research)
To address an increasingly complex threat landscape, Equifax, a global leader in information solutions, knew it had to develop a more holistic approach that could protect against known and unknown threats. In this resource, discover the benefits Equifax enjoyed by moving from a standard network detection model to an intrusion prevention framework. 
(CASE STUDY) READ ABSTRACT |

Case Study: UAEU Sets the Standard for Network Security with HP by Hewlett-Packard Limited

April 30, 2013 - (Free Research)
Explore how the United Arab Emirates University was able to embrace mobile technology in the classroom while successfully mitigating both internal and external threats and increasing security visibility thanks to a next-generation intrusion protection system. 
(CASE STUDY) READ ABSTRACT |

Justifying a Computer Incident Response Plan by Dell SecureWorks UK

February 07, 2013 - (Free Research)
This essential resource explores the need for effective incident response in order to reduce the costs of data breaches and mitigate risk. It also outlines best practices for creating an effective Computer Incident Response Plan (CIRP) – read on to learn more now. 
(WHITE PAPER) READ ABSTRACT |

Global Business Gets Continuous Worldwide Network Protection by Dell SecureWorks UK

May 31, 2012 - (Free Research)
In this case study, find out how one organization's investments in an intrusion detection system (IDS) and continuous firewall are providing them with comprehensive protection that doesn't negatively impact network performance – read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Real-time Monitoring, Alerts, and Analysis Offer In-Depth Security by Dell SecureWorks UK

March 01, 2012 - (Free Research)
In this case study explore how implementing Dell SecureWorks enabled Pharmaceutical firm, ProStrakan, to enhance its security and compliance posture by providing 24/7 monitoring, instant alerts and in-depth threat analysis. 
(CASE STUDY) READ ABSTRACT |

Magic Quadrant for Security Information and Event Management by LogRhythm, Inc.

May 07, 2013 - (Free Research)
This Gartner Magic Quadrant on security information and event management (SIEM) systems reveals the strengths and cautions of 16 different vendors to help you find the system that best aligns with your business needs. 
(ANALYST REPORT) READ ABSTRACT |

Cisco ASA 5500 Series Adaptive Security Appliance by Cisco Systems, Inc.

August 2008 - (Free Research)
In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management. 
(WEBCAST) READ ABSTRACT |

How to Build a Massively Scalable Next-Generation Firewall by Dell Software

August 2013 - (Free Research)
Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls. 
(WHITE PAPER) READ ABSTRACT |

IBM Security Network Intrusion Prevention System by IBM

March 2011 - (Free Research)
This 3-minute video explains the benefits of a network intrusion prevention system (IPS) and how one can help you reduce your exposure of risk while simultaneously cutting down your liability. View now to learn more. 
(VIDEO) READ ABSTRACT |

A Hidden Security Danger: Network Timing by Symmetricom

December 2010 - (Free Research)
Most anyone who uses a PC no doubt sees the little clock at the bottom of the screen,dutifully ticking off the minutes of the passing day. But chances are they don’t often think about the role that clock plays in the network to which the PC is attached. 
(WHITE PAPER) READ ABSTRACT |

Hackers Open Malware Backdoor in Apache Webservers by Thawte Inc.

July 2013 - (Free Research)
A new threat is targeting Apache webservers, which are among the most widely used webservers in the world. Read this expert E-Guide to discover how to fight back against these hackers and secure your webserver. 
(EGUIDE) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved by MarkMonitor

October 2008 - (Free Research)
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites. 
(WHITE PAPER) READ ABSTRACT |

Cybersecurity Information Sharing: Establishing New Protocols by BMC Software, Inc.

December 2012 - (Free Research)
This eGuide will tune you in to the challenges of cybersecurity information sharing, why it's needed more than ever, and what can be done to keep everyone properly informed and protected. Topics covered include today's sharing initiatives, the importance of baseline cybersecurity practices, the rules governing cybersecurity information, and more. 
(EGUIDE) READ ABSTRACT |

FireEye 1H 2011 Advanced Threat Report by FireEye

November 2011 - (Free Research)
This FireEye Advanced Threat report offers a global view into the cyber attacks that routinely bypass traditional defenses, using the threat data shared by thousands of FireEye Malware Protection Systems (MPS) deployments. View now to explore key findings in this analysis that uncover the real security issues enterprises face today. 
(ANALYST REPORT) READ ABSTRACT |

Case Study: A Large Multi–Program National Laboratory Stays Ahead of Next-Generation Malware By Deploying FireEye Web Malware Protection System by FireEye

May 2011 - (Free Research)
This case study will outline how one company trusted FireEye's Web Malware Protection System to guard their highly sensitive information and how well the system performed. You will also learn about the features the security solutions contains and how it could be perfect for your business.   
(CASE STUDY) READ ABSTRACT |

Battling Modern Botnets by FireEye

April 2008 - (Free Research)
The FBI ranks cybercrime among its top priorities in part because botnets are proliferating at an alarming rate, crossing corporate boundaries and spreading infections behind corporate firewalls. Learn how FireEye provides advance detection and a blended approach to today’s botnet problem that "traditional" solutions do not. 
(WHITE PAPER) READ ABSTRACT |

Unraveling Web Malware by FireEye

September 2008 - (Free Research)
There's no denying the rapid rise in the use of Web-based blended threats to compromise client browsers and operating systems. Increasing use of Web 2.0 technologies, syndicated, iframes, third-party widgets - all of these proliferate malicious software. 
(WHITE PAPER) READ ABSTRACT |

Stopping Crimeware In Its Tracks by FireEye

September 2008 - (Free Research)
This paper describes the damaging cybercrime threat posed by botnets, explains why traditional security solutions cannot stop them, and proposes a new approach that can eradicate cybercrime from corporate networks. 
(ANALYST REPORT) READ ABSTRACT |

Getting the Most from Your Wireless Network by WildPackets, Inc.

August 2008 - (Free Research)
Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee. 
(WHITE PAPER) READ ABSTRACT |

Network Forensics in a 10G World by WildPackets, Inc.

August 2013 - (Free Research)
This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world. 
(WHITE PAPER) READ ABSTRACT |

August Issue of Information Security magazine: On the Lookout: Countering modern threats requires hunting intruders by Information Security Magazine

August 2011 - (Free Research)
This month's Information Security Magazine Online cover story highlights the concern surrounding self-defending networks and explores a new approach to network security – CTOps. Also, learn how to uncover hidden opportunities that could be lurking in your overflow of data and gain an indepth look of the biggest IT giants in today's security market. 
(EZINE)

Your September Issue of Information Security Magazine– Readers’ Choice Awards by Information Security Magazine

September 2010 - (Free Research)
In this month’s issue we provide our 5th annual Readers’ Choice Awards for the best security products in the market. We’ve talked with over 1,500 Information Security readers to find what their favorite products are and why. Read through to see which ones take the gold. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine, May 2009: Automating Compliance by Information Security Magazine

May 2009 - (Free Research)
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more. 
(EZINE)

1 - 25 of 178 | Next Page

> Explore alternative searches for: Intrusion Detection/ Forensics

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts