Intrusion Detection White Papers

Intrusion Detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion Detection can be performed manually or automatically. Manual intrusion detection might take place by examining log files or other evidence for signs of intrusions, including network traffic. A system that performs automated intrusion detection is called an Intrusion Detection System (IDS). An IDS can be either host-based, if it monitors system calls or logs, or network-based if it monitors the flow of network packets.
Results 1 - 25 of 348Sort Results By: Published Date | Title | Company Name
By: Websense     Published Date: Jul 08, 2014

A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.

Tags : detecting unknown threats, websense, next-generation firewall, anti spam, anti spyware, anti virus, application security, encryption
    
By: Websense     Published Date: Jul 08, 2014

This paper provides 5 essentials for protecting against advanced persistent threats (APTS)

Tags : apts, understanding apts, apt security strategy, anti spam, anti spyware, anti virus, hacker detection, internet security
    
By: Websense     Published Date: Jul 08, 2014

A white paper on the shortest path to prevention and risk production.

Tags : protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware, anti virus, internet security, intrusion detection
    
By: Websense     Published Date: Jul 08, 2014

This paper reports on a independent third party test of Websense Triton Web Security Gateway Anywhere against four competing products.

Tags : websense, wsga, web security, testing of web security, web security products compared, phising, malicious redirects, access control
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: Cisco     Published Date: Jun 16, 2014

How Cisco® Web Security enables better data and brand protection for today’s enterprises.

Tags : web security, cisco, brand protection, security, internet security, intrusion detection, intrusion prevention, web service security
    
By: Cisco     Published Date: Jun 16, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, cisco, email security, threat detection network, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 16, 2014

How Cisco® Web Security enables better data and brand protection for today’s enterprises.

Tags : web security, cisco, brand protection, security, internet security, intrusion detection, intrusion prevention, web service security
    
By: Cisco     Published Date: Jun 16, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 12, 2014

A paper providing an overview of Cisco Email Security

Tags : email security, cisco, email security, threat detection network, internet security, intrusion detection
    
By: Cisco     Published Date: Jun 12, 2014

How Cisco® Web Security enables better data and brand protection for today’s enterprises.

Tags : web security, cisco, brand protection, security, internet security, intrusion detection, intrusion prevention, web service security
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Absolute Software     Published Date: May 14, 2014

Three simple steps to legally secure and manage employee-owned devices within a corporate environment

Tags : byod, workforce mobility, enpoint protection, mobile devices, absolute software, access control, application security, identity management
    
By: Rapid7     Published Date: Mar 19, 2014

In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.

Tags : rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
By: Symantec     Published Date: Mar 14, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
    
By: IBM     Published Date: Feb 27, 2014

Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.

Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
By: Arbor Networks     Published Date: Feb 12, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors.

Tags : arbor, arbor networks, security management, firewalls, threats, hackers, internet security, network security
    
By: McAfee     Published Date: Jan 28, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
By: McAfee     Published Date: Jan 28, 2014

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Tags : epp, endpoint, protection, threats, malware, nss, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 28, 2014

Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.

Tags : blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod, anti spam
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Norse     Published Date: Nov 19, 2013

Learn how your current defenses against cyber-attacks are outdated and how intelligence-based strategies will protect your organization from advanced attacks.

Tags : cyber criminal, cyber-attacks, advanced attacks, hackers, network, infrastructure, anti spam, anti spyware
    
By: McAfee     Published Date: Nov 11, 2013

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Tags : mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, firewalls
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.