Research Library > Technology > Security > Intrusion Prevention

Intrusion Prevention

An Intrusion Prevention System is any device which exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall. The latest Next Generation Firewalls leverage their existing deep packet inspection engine by sharing this functionality with an Intrusion-prevention system.
Results 76 - 100 of 536Sort Results By: Published Date | Title | Company Name
White Paper Published By: Internap     Published Date: Mar 30, 2015
How do you determine the right colocation provider for your business? Colocation can offer many cost-efficient benefits, including scalability, improved business continuity, security and compliance.
Tags : 
business continuity, security, scalability, data center, connectivity
    
Internap
White Paper Published By: F5 Networks     Published Date: Mar 18, 2015
The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs, and stay protected in the future.
Tags : 
f5 networks, ddos, ip security, real time attack, data protection
    
F5 Networks
White Paper Published By: F5 Networks     Published Date: Mar 18, 2015
Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works and how to mitigate Neverquest.
Tags : 
f5 networks, malware, security, network security, anti spam
    
F5 Networks
White Paper Published By: Arbor Networks     Published Date: Mar 13, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : 
arbor, arbor networks, hackers, cyberattacks, internet security
    
Arbor Networks
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report aggregates front-line experience to present the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This paper reveals how McAfee Threat Intelligence Exchange delivers this innovative endpoint protection with a system that adapts and learns from encounters and immediately neutralizes emerging threats.
Tags : 
mcafee threat intelligence exchange, mcafee, endpoint, attacks, protection
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.
Tags : 
siem, real-time siem, attacks, real-time security, mcafee
    
McAfee
White Paper Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs
Tags : 
siem, real-time siem, attacks, real-time security, mcafee
    
McAfee
White Paper Published By: Juniper Networks     Published Date: Feb 18, 2015
Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : 
juniper, juniper networks, security, network security, firewalls
    
Juniper Networks
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.
Tags : 
cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This guide provides information on how to reduce risk in today's IT environment.
Tags : 
reduce risk in it environment, it environment security, data security breach prevention, preventive measures for data security, application security
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This paper reveals how important is effective security software for banking threats.
Tags : 
online and mobile banking threats, online e-payments, security of online payments, cybercriminals, protection mechanisms used by banks
    
Kaspersky
White Paper Published By: Kaspersky     Published Date: Feb 05, 2015
This paper gives information about how Automatic Exploit Prevention significantly reduces the risk of infection from widespread malware, or more targeted attacks using exploits – even when a zero-day vulnerability is used.
Tags : 
benefits to enterprise it security, exploit prevention, protection from exploits, software attacks, anti spam
    
Kaspersky
Webinar Published By: Cisco     Published Date: Jan 21, 2015
Camera intelligence continues to expand and offer options that simply did not exist before. Nick Kong joins TechWiseTV for a little show and tell with the latest 6000 series of IP Cameras.
Tags : 
cisco, medianet, media, net, video
    
Cisco
White Paper Published By: McAfee     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, anti spyware
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 20, 2015
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization
    
McAfee
Case Study Published By: CA Technologies     Published Date: Jan 09, 2015
This survey provides information on the level of interest in BYOID that IT users and Business Users have. The majority of respondents in both groups have high levels of interest in BYOID, but IT users and business user groups have different views about the perceived potential value of BYOID.
Tags : 
byod, identity, byoid benefits, access control, application security
    
CA Technologies
Webinar Published By: Firehost     Published Date: Jan 07, 2015
This Webinar covers all of the details you will need to know about PCI DSS 3.0.
Tags : 
pci dss 3.0, data security program, risk management practices, pci, access control
    
Firehost
White Paper Published By: Corero     Published Date: Dec 05, 2014
Few hosting providers today offer sufficient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more efficiently protect their hosted infrastructure and gain a competitive advantage in the marketplace. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services.
Tags : 
corero, ddos, distributed denial of service, data protection, ddos attack
    
Corero
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This solution brief is aimed at helping you to implement the right security strategy now.
Tags : 
implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.