Intrusion Detection White Papers

Intrusion Detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion Detection can be performed manually or automatically. Manual intrusion detection might take place by examining log files or other evidence for signs of intrusions, including network traffic. A system that performs automated intrusion detection is called an Intrusion Detection System (IDS). An IDS can be either host-based, if it monitors system calls or logs, or network-based if it monitors the flow of network packets.
Results 1 - 25 of 437Sort Results By: Published Date | Title | Company Name
By: AlienVault     Published Date: Aug 13, 2015

Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.

Tags : alienvault, security, siem, hacking, threat detection, hacker detection, internet security, intrusion detection
    
By: AlienVault     Published Date: Aug 13, 2015

Whether you’re part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.

Tags : alienvault, security, soc, hacking, threat detection, application security, hacker detection, intrusion detection
    
By: Viavi Solutions     Published Date: Aug 05, 2015

The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera.

Tags : apm, security, hacking, performance monitoring, intrusion detection, intrusion prevention, web service security, vulnerability management
    
By: Viavi Solutions     Published Date: Aug 05, 2015

With increasingly creative exploits, it is important to stay ahead of the curve when it comes to data protection. Performance monitoring tools that do not keep pace can leave your information vulnerable.

Tags : apm, security, hacking, performance monitoring, anti virus, application security, hacker detection, intrusion detection
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra empowers IT and security analysts with insights to stop attacks, even while they’re happening.

Tags : network security management, it security, intrusion prevention, security analysis, cyberattacks, cybercriminals, adaptive protection, intrusion prevention systems
    
By: Vectra Networks     Published Date: Aug 03, 2015

The data in this report is based on metadata from Vectra customers and prospects who opted to share detection metrics from their production network environments.

Tags : post intrusion report, metadata, network threats, network security management, it security, botnet monetization, data exfiltration, security management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.

Tags : data, security, threats, protection, advanced threat, ips, ids, firewall
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.

Tags : utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats
    
By: IBM     Published Date: Jul 31, 2015

Optimize the process of investigating and gathering evidence.

Tags : data, security, threats, protection, business continuity, compliance, hacker detection, intrusion detection
    
By: IBM     Published Date: Jul 31, 2015

New endpoint solution.

Tags : hacker detection, identity management, intrusion detection
    
By: Venafi     Published Date: Jul 27, 2015

See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.

Tags : security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
By: Venafi     Published Date: Jul 27, 2015

To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.

Tags : cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates
    
By: Venafi     Published Date: Jul 27, 2015

Read this important brief to learn how to maintain your cybersecurity and reduce risk.

Tags : sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection
    
By: Venafi     Published Date: Jul 27, 2015

Read the solution brief to close SSH security gaps and protect your business.

Tags : ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
    
By: Venafi     Published Date: Jul 27, 2015

Read this solution brief to learn how Security Operations teams can eliminate outages.

Tags : outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
By: Kaseya     Published Date: May 13, 2015

To win the ongoing war against hackers and cyber criminals, IT professionals must do two things: Deploy and maintain endpoint security tools with the latest updates, and ensure the software applications running in their networks have the latest available patches.

Tags : kaseya, hybrid, cloud, management, msp, mobile, big data, security
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: EMC     Published Date: Aug 03, 2015

This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.

Tags : afa, snapshot technology, data protection, recovery strategies, cloud adoption, production data, emc, snapshot performance
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.