Research Library > Technology > Security > Intrusion Detection

Intrusion Detection

Intrusion Detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion Detection can be performed manually or automatically. Manual intrusion detection might take place by examining log files or other evidence for signs of intrusions, including network traffic. A system that performs automated intrusion detection is called an Intrusion Detection System (IDS). An IDS can be either host-based, if it monitors system calls or logs, or network-based if it monitors the flow of network packets.
Results 351 - 375 of 461Sort Results By: Published Date | Title | Company Name
White Paper Published By: Symantec.cloud     Published Date: Aug 10, 2010
This industry report covers the email gateway market. Gartner, Inc. positions Gartner in the Leaders quadrant in its 2010 Magic Quadrant for Secure Email Gateways (anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention).
Tags : 
messagelabs, hosted symantec services, gartner magic quadrant, secure email gateway, anti-spam
    
Symantec.cloud
White Paper Published By: Symantec.cloud     Published Date: Jul 06, 2010
Read our white paper to understand the changing web threat in 2010 & equip your business to defend against it.
Tags : 
messagelabs symantec, web threat, malware, threat detection, web security services
    
Symantec.cloud
White Paper Published By: Proofpoint     Published Date: Apr 23, 2010
Email security and compliance issues related to HIPAA healthcare privacy regulations for 2012.
Tags : 
email security, intrusion detection, intrusion prevention, secure instant messaging
    
Proofpoint
White Paper Published By: Proofpoint     Published Date: Apr 23, 2010
This free email encryption whitepaper from Osterman Research discusses key issues around the encryption of both email and file transfer systems, some of the leading statutes that require sensitive content to be encrypted, and suggestions for moving forward with encryption.
Tags : 
proofpoint, encrypted email, secure file transfer, data breach prevention, encryption
    
Proofpoint
White Paper Published By: ESET     Published Date: Feb 17, 2010
This paper is designed to provide a basic understanding of what heuristics are and how they are used in the anti-malware industry.
Tags : 
eset, teaching heuristics, anti-malware, encryption, polymorphism
    
ESET
Webinar Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize
    
McAfee Inc
White Paper Published By: IBM     Published Date: Sep 10, 2009
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and more!
Tags : 
ibm iss x-force threat and risk report, ibm, web-related security threats, spam and phishing, malware
    
IBM
Case Study Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco
    
Astaro
White Paper Published By: Tripwire     Published Date: Jun 30, 2009
Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.
Tags : 
tripwire, hipaa, security, provision, network
    
Tripwire
White Paper Published By: Absolute Software     Published Date: May 08, 2009
Keeping data secure in a mobile environment is not just a daunting challenge, but a critical requirement. Loss and theft of computers leaves sensitive data vulnerable, creating serious financial and legal risks.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
White Paper Published By: Absolute Software     Published Date: May 08, 2009
In this whitepaper, the Ponemon Institute shares its findings on the use of encryption on laptops by corporate employees. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Tags : 
absolute, laptop, saas, lock down, rapid recovery
    
Absolute Software
White Paper Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak
    
Trend Micro, Inc.
White Paper Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : 
trend micro, data breach, dlp, credit cards, breaches
    
Trend Micro, Inc.
White Paper Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : 
trend micro, data breach, smb, midsize, breaches
    
Trend Micro, Inc.
White Paper Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : 
trend micro, data breach, breaches, data breaches, data loss prevention
    
Trend Micro, Inc.
White Paper Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery
    
Trend Micro, Inc.
White Paper Published By: ArcSight     Published Date: Mar 04, 2009
Whitepaper highlighting the twelve PCI DSS requirements and the technology necessary to address the PCI DSS 1.2 requirements.
Tags : 
pci dss, pci dss 1.2, log management, arcsight logger, siem
    
ArcSight
White Paper Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity
    
ArcSight
White Paper Published By: ThreatMetrix.     Published Date: Jan 30, 2009
This white paper highlights a surprising new approach to fraud prevention: remotely recognizing a fraudster’s PC (or other device). Even with identity (password/credit card) theft, the device stays the same!
Tags : 
threatmetrix, online fraudsters, identity thieves, fraud prevention, device intelligence
    
ThreatMetrix.
White Paper Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In this new white paper, learn how it’s possible to block fraud without damaging the customer experience and causing dropoff.
Tags : 
threatmetrix, device identification, dropoff, security token, fraud prevention solutions
    
ThreatMetrix.
White Paper Published By: ThreatMetrix.     Published Date: Jan 30, 2009
In 2007 alone, $3.6 billion was lost to online fraud. This white paper shows how to block scam artists, reliably and affordably-while ensuring that real customers always have access.
Tags : 
threatmetrix, e-commerce fraud, revenue loss, scam artists, internet security
    
ThreatMetrix.
White Paper Published By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : 
cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl
    
Cisco
White Paper Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing, security
    
LockLizard
White Paper Published By: MessageLabs     Published Date: Sep 22, 2008
In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.
Tags : 
botnet, bot, messagelabs, email security, malware
    
MessageLabs
White Paper Published By: Javelin Strategy & Research     Published Date: Jul 02, 2008
Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.
Tags : 
javelin, debix, customer service, customer experience, damage control
    
Javelin Strategy & Research
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.