Research Library > Technology > Security > Intrusion Detection

Intrusion Detection

Intrusion Detection is the act of detecting actions that attempt to compromise the confidentiality, integrity or availability of a resource. Intrusion Detection can be performed manually or automatically. Manual intrusion detection might take place by examining log files or other evidence for signs of intrusions, including network traffic. A system that performs automated intrusion detection is called an Intrusion Detection System (IDS). An IDS can be either host-based, if it monitors system calls or logs, or network-based if it monitors the flow of network packets.
Results 1 - 25 of 460Sort Results By: Published Date | Title | Company Name
Case Study Published By: Astaro     Published Date: Jan 19, 2011
Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.
Tags : 
astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy
    
Astaro
White Paper Published By: GE Power     Published Date: Jan 27, 2017
Dont wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.
Tags : 
cyber security, power plants, utilities, power producers, power plant
    
GE Power
White Paper Published By: Secureworks     Published Date: Nov 11, 2016
Sit back and relax while we pull back the curtains and reveal what happens, start to finish, when a threat is detected.
Tags : 
managed security services, threat detection, risk management, cyber security, intrusion detection
    
Secureworks
White Paper Published By: Kaspersky     Published Date: Oct 26, 2016
Download our eBook Healthcare Ransomware: Hospitals on Hold to learn the measures your hospital or healthcare organization can put in place to ensure that this menace does not happen to you.
Tags : 
kaspersky, hospital records, healthcare security, secure data, cybercrime
    
Kaspersky
White Paper Published By: IBM     Published Date: Oct 06, 2016
Defensive weak spots are just waiting to be found and exploited by persistent cyber attackers. But with cyber threat analysis, you quickly identify, disrupt and mitigate breaches by uncovering critical insights unseen by traditional defenses.
Tags : 
cyber security, threats, enterprise insight analysis, data computation, intelligence
    
IBM
White Paper Published By: Entrust Datacard     Published Date: Sep 28, 2016
This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.
Tags : 
security, security application, ssl, ssl certificates, sha
    
Entrust Datacard
White Paper Published By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.
Tags : 
security application, data centers, data, cyber-attacks, security
    
Kaspersky Lab Australia and New Zealand
White Paper Published By: Forcepoint     Published Date: May 16, 2016
2014 wurden mehr als 700 Millionen Datenstze durch Verletzungen der Datenintegritt kompromittiert. Die finanziellen Verluste werden auf mindestens 400 Mio. USD geschtzt. Gleichzeitig stieg die Anzahl der Sicherheitsvorflle um 66 Prozent. Lassen Sie nicht zu, dass Ihr Wachstum durch Angst gebremst wird. Der Bericht "Verhinderung von Datendiebstahl" konzentriert sich darauf, wie Sie aus breiterer, intelligenterer Anwendungssicht sicher bleiben, whrend Sie Innovationen vorantreiben.
Tags : 
security, data theft prevention, data security, security application, anti spam
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: May 16, 2016
Die finanziellen und rechtlichen Konsequenzen der whrend des vergangenen Jahres verzeichneten ffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverstndliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen berblick ber das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prfstand zu stellen.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: May 16, 2016
Les ramifications financires et juridiques des cyber-incidents hautement mdiatiss de lanne dernire ont envoy un message clair : le vol de donnes est trop important pour que le Conseil dadministration ne soit pas impliqu. Le rapport Cyberscurit et prvention du vol de donnes fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour valuer les mesures de scurit actuelles de sa socit.
Tags : 
cyber security, security, cybersecurity, security application, data theft prevention
    
Forcepoint
White Paper Published By: Code42     Published Date: Apr 22, 2016
The studys findings highlight discrepanciesbetween IT departments and end usersin the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups, anti spyware
    
Code42
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
Je lnger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist mglich - und desto grer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz fr Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mgliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafr, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden knnen.
Tags : 
cyber security, security application, security, cybersecurity, data prevention
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
En 2014, les fuites de donnes ont compromis plus de 700 millions de dossiers, engendrant des pertes financires estimes au moins 400 millions $, et la frquence des incidents lis la scurit est passe 66 pour cent. Mais ne laissez pas la crainte touffer votre croissance. Le rapport sur la prvention contre le vol de donnes se penche principalement sur la manire de vous protger lorsque vous innovez, mais selon une perspective plus large en termes de porte et plus intelligente dans lapplication.
Tags : 
security, data theft prevention, data security, security application, anti spam
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.
Tags : 
cyber attack, security, security application, cybersecurity, cybersecurity
    
Forcepoint
White Paper Published By: Forcepoint     Published Date: Apr 20, 2016
Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness seeing the extent of your user behavior starts with five pillars and ends with unquestioned success.
Tags : 
risk, security, security programme, security, security application
    
Forcepoint
White Paper Published By: Cisco     Published Date: Mar 16, 2016
This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.
Tags : 
service providers, ddos, security, cyber security, cyber threats
    
Cisco
White Paper Published By: Akamai Technologies     Published Date: Mar 10, 2016
When your Internet-facing network comes under DDoS attack, does your entire organization panic or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.
Tags : 
ddos mitigation, best practices, akamai technology, cyberdefense, cyber security
    
Akamai Technologies
White Paper Published By: Logrhythm     Published Date: Feb 24, 2016
The time has come for CEOs and Boards to take personal responsibility for improving their companies cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks
    
Logrhythm
Webinar Published By: Logrhythm     Published Date: Feb 24, 2016
In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.
Tags : 
logrhythm, cyber attacks, cyber threat, security, security application
    
Logrhythm
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
This guide explores how EV certificates reduce phishing and man-in-the-middle attacks, bring trust, reduce shopping cart abandonment, protect brand and provide support saving.
Tags : 
verification, ev certificates, identification, extended validation ssl certificates, security
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper reveals how tools available from Entrust offer one of the most cost-effective solutions to these problems.
Tags : 
entrust solutions, certificates, security, security application, authority
    
Entrust Datacard
White Paper Published By: Sophos     Published Date: Oct 07, 2015
This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
endpoint buyers, vendors, endpoint security solution, antivirus, security solutions
    
Sophos
Webinar Published By: AlienVault     Published Date: Aug 13, 2015
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM.
Tags : 
alienvault, security, siem, hacking, threat detection
    
AlienVault
White Paper Published By: AlienVault     Published Date: Aug 13, 2015
Whether youre part of a security team or a one-man show, this guide will teach you what data your SOC needs. Download this guide now to accelerate your evaluation of SOC tools and technology needs.
Tags : 
alienvault, security, soc, hacking, threat detection
    
AlienVault
White Paper Published By: Viavi Solutions     Published Date: Aug 05, 2015
The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera.
Tags : 
apm, security, hacking, performance monitoring, intrusion detection
    
Viavi Solutions
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.