Get your company's research in the hands of targeted business professionals.
Intrusion Detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion Detection can be performed manually or automatically. Manual intrusion detection might take place by examining log files or other evidence for signs of intrusions, including network traffic. A system that performs automated intrusion detection is called an Intrusion Detection System (IDS). An IDS can be either host-based, if it monitors system calls or logs, or network-based if it monitors the flow of network packets.
Read this whitepaper to understand how combining the iSensor Intrusion Prevention appliance with 24x7 monitoring and administration by Dell SecureWorks' certified security experts to deliver exceptional cyber threat protection for your midsize organization.
Read this whitepaper to learn how Dell SecureWorks' multi-phase Penetration testing can help you obtain a true understanding of your security and risk posture so that you can strengthen your defenses and prevent a successful attack.
Webinar Published By: Google
Published Date: Apr 04, 2011
On demand version of this webinar. Today' s computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents
This white paper explains the epidemic threat of hackers injecting hidden malware into websites and the negative effect on the brand and traffic to the victim website when blacklisted by Google as a "harmful" website.
This white paper examines how states like Massachusetts have implemented one of the most stringent and far-reaching requirements for protecting consumer data and how organizations of all sizes can meet the privacy requirements with simple, scalable encryption technologies.
This Executive Brief sheds light on the risk of cybercrime by profiling several "generations" of cybercriminals over time, and pointing out how the criminals, their methods and motivations have evolved.
White Paper Published By: SafeNet
Published Date: Sep 08, 2010
This paper will provide insight into the top five threats to the online banking in the financial services industry and SafeNet's recommended solutions for a defense that not only provides a secure transaction environment for customers but also satisfies stringent government and industry compliance regulations.
White Paper Published By: Brocade
Published Date: Sep 07, 2010
The trend toward more collaborative and open learning environments, fueled by the explosive adoption of mobile devices among students and faculty, makes higher-education campuses fertile
ground for wireless LAN technology.
White Paper Published By: IBM
Published Date: Aug 30, 2010
Stronger Measures Have Become Essential To Defend Against Growing Attacks. Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it.
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
White Paper Published By: Proofpoint
Published Date: Apr 23, 2010
This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.