Intrusion Prevention White Papers

An Intrusion Prevention System is any device which exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall. The latest Next Generation Firewalls leverage their existing deep packet inspection engine by sharing this functionality with an Intrusion-prevention system.
Results 1 - 25 of 484Sort Results By: Published Date | Title | Company Name
By: Tenable Network Security     Published Date: Jul 23, 2015

Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.

Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot, log analysis, network security, security management
    
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: BitSight Technologies     Published Date: Jul 23, 2015

Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.

Tags : vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards
    
By: IBM     Published Date: Jul 15, 2015

How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.

Tags : database vulnerability, proactive strategies, data protection, compliance, data breach, data security, risk reduction, application security
    
By: IBM     Published Date: Jul 15, 2015

This ebook outlines four steps to develop a proactive approach to data security and privacy that will help you keep big data safe

Tags : big data security, data privacy, data protection, sensitive data, data risk management, vulnerability management, ibm solutions, data breaches
    
By: IBM     Published Date: Jul 15, 2015

How to create proactive big data security and privacy strategies

Tags : data security, compliance, data protection, data privacy, safeguarding information, database protection, enterprise risk management, vulnerability detection
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations.

Tags : endpoint management, path compliance, lifecycle management, patch management, vulnerability management, endpoint security, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper is about protecting data, enabling mobility and empowering users; unified endpoint management.

Tags : data protection, mobility, endpoint management, governance policies, consumerization, byod, security platforms, enterprise mobility
    
By: IBM     Published Date: Jul 15, 2015

This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.

Tags : security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management, compliance
    
By: IBM     Published Date: Jul 15, 2015

Examining the business ramifications of various fraud-prevention technology approaches.

Tags : fraud prevention technology, fraud loss avoidance, customer impact, fraud management costs, security management, malware prevention, compliance, disaster recovery
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the state of todayís cyber threat landscape, current platforms for fraud management fall short, hurting customers in the process, and Trusteer's Cybercrime Prevention Architecture.

Tags : cybercrime, malware prevention management, malware fraud, financial fraud, security solutions, vulnerability management, malware attacks, data security
    
By: IBM     Published Date: Jul 15, 2015

This paper talks about the importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions.

Tags : cyber threats, fraud prevention, fraud management, holistic solutions, end user disruptions, defrauding, malware management, disaster recovery
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Labís ďEndpoint Security for Business: Technology in ActionĒ to learn about threats you can see and those you canít.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Labís Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.

Tags : kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isnít enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Seagate Technology     Published Date: Apr 14, 2015

Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofitís Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofitís needs.

Tags : surveillance, security system, virtual management software, cameras, network performance management, intrusion prevention, network security appliance, security management
    
By: Kaspersky     Published Date: Nov 12, 2014

Download Kaspersky Labís latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.

Tags : kaspersky, cybersecurity, cyberattack, hackers, it security, data protection, network security, anti virus
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Donít get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: Venafi     Published Date: Jul 27, 2015

See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.

Tags : security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
By: Venafi     Published Date: Jul 27, 2015

To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.

Tags : cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates
    
By: Venafi     Published Date: Jul 27, 2015

Read this important brief to learn how to maintain your cybersecurity and reduce risk.

Tags : sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection
    
By: Venafi     Published Date: Jul 27, 2015

Read the solution brief to close SSH security gaps and protect your business.

Tags : ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
    
By: Venafi     Published Date: Jul 27, 2015

Read this solution brief to learn how Security Operations teams can eliminate outages.

Tags : outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.