Intrusion Prevention White Papers

An Intrusion Prevention System is any device which exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall. The latest Next Generation Firewalls leverage their existing deep packet inspection engine by sharing this functionality with an Intrusion-prevention system.
Results 1 - 25 of 434Sort Results By: Published Date | Title | Company Name
By: Threat Stack     Published Date: Feb 11, 2015

In this webinar, an expert panel will examine the security needs of a modern, DevOps-managed infrastructure and how this changes how organizations protect their customer data.

Tags : threat stack, security monitoring, cloud security, intrusion detection, hackers, data loss prevention, network security, small business networks
    
By: Network Instruments     Published Date: Dec 29, 2014

With the expanding sophistication of large-scale breaches, the question isn’t whether most organizations will be hacked – it’s when. The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera. It also includes a case study of how one network team used a performance monitoring solution to identify the surprising source of an attack.

Tags : apm, security, application performance management, it infrastructure, it security, data loss, intrusion detection, intrusion prevention
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: Cisco     Published Date: Jan 21, 2015

Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.

Tags : cisco, medianet, media, net, video, intelligence, surveillance, deployment
    
By: CA Technologies     Published Date: Jan 09, 2015

This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.

Tags : byod, identity, byoid benefits, access control, application security, authentication, identity management, intrusion prevention
    
By: Firehost     Published Date: Jan 07, 2015

This Webinar covers all of the details you will need to know about PCI DSS 3.0.

Tags : pci dss 3.0, data security program, risk management practices, pci, backup and recovery, access control, anti virus, application security
    
By: Corero     Published Date: Dec 05, 2014

Few hosting providers today offer sufficient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more efficiently protect their hosted infrastructure and gain a competitive advantage in the marketplace. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services.

Tags : corero, ddos, distributed denial of service, data protection, ddos attack, threat protection, hosted threats, intrusion prevention
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, firewalls, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, encryption, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 19, 2014

This info-graphic provides important statistics and information on web-based targeted attacks and how you can help protect yourself.

Tags : web based targeted attacks, internet security, protections from web attacks, anti spam, anti spyware, anti virus, firewalls, intrusion detection
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity
    
By: Symantec     Published Date: Nov 19, 2014

The top ten tips on how to secure your business against cyber risk and threats.

Tags : tips for cyber resilience, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection
    
By: Symantec     Published Date: Nov 19, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 19, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 19, 2014

This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.

Tags : the cost of a data breach, business costs of a data breach, responses to a data breach, firewalls, internet security, intrusion detection, intrusion prevention, data protection
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.