Intrusion Detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion Detection can be performed manually or automatically. Manual intrusion detection might take place by examining log files or other evidence for signs of intrusions, including network traffic. A system that performs automated intrusion detection is called an Intrusion Detection System (IDS). An IDS can be either host-based, if it monitors system calls or logs, or network-based if it monitors the flow of network packets.
Webinar Published By: NetApp and VMware
Published Date: Jan 09, 2012
Paula Fortin of Green Mountain Power explains how their strategy for disaster recovery of their virtual infrastructure was readily possible during Hurricane Irene.
Webinar Published By: NetApp and VMware
Published Date: Jan 06, 2012
Experts discuss how customers can virtualize business-critical apps leveraging common resource pools as key elements to delivering IT as service and cloud computing.
White Paper Published By: Okta
Published Date: Jan 06, 2012
These days securing access to cloud applications is critical, yet the current approach relying on single passwords leaves businesses susceptible to compromise. Read this whitepaper to find out more how to secure your cloud based applications using Okta's MFA solution.
White Paper Published By: ZScaler
Published Date: Nov 16, 2011
The agility, scalability, security and cost benefits of cloud security and security-as-a-service offerings are being realized for enterprises large and small. This whitepaper outlines seven key reasons why you should consider a cloud-delivered security solution.