Intrusion Prevention White Papers

An Intrusion Prevention System is any device which exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall. The latest Next Generation Firewalls leverage their existing deep packet inspection engine by sharing this functionality with an Intrusion-prevention system.
Results 1 - 25 of 515Sort Results By: Published Date | Title | Company Name
By: Nuance Communications     Published Date: Jun 17, 2009

The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, identity management, internet security, intrusion prevention, security management, security policies, web service security, ebusiness
    
By: iboss     Published Date: Jan 22, 2018

Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.

Tags : iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention, ssl, wireless security, data protection
    
By: iboss     Published Date: Jan 22, 2018

While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.

Tags : iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, wireless security, data protection, business technology, mobile device management
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security, data loss prevention
    
By: Thales     Published Date: Jul 13, 2017

Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.

Tags : thales, data protection, health records, data security, hippa, hacker detection, intrusion prevention, best practices, records management, data loss prevention
    
By: Proofpoint     Published Date: May 17, 2017

In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.

Tags : proofpoint, ransomware, intrusion prevention, cyberattack, data protection, network security, encryption, wireless security, it spending, email archiving, vulnerability management, business technology
    
By: GE Power     Published Date: Jan 27, 2017

Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.

Tags : cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment, network security, hacker detection, intrusion detection, intrusion prevention, security policies, data protection
    
By: Secureworks     Published Date: Nov 11, 2016

To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.

Tags : managed security services, risk management, security, threat and vulnerability management, attacks, insider attacks, cyber security, intrusion prevention, vulnerability management
    
By: Entrust Datacard     Published Date: Sep 28, 2016

This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.

Tags : security, security application, ssl, ssl certificates, sha, application security, compliance, intrusion detection, intrusion prevention, security management, security policies
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.

Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware, anti virus, application security, encryption, internet security, intrusion detection, intrusion prevention, security management, data loss prevention
    
By: Forcepoint     Published Date: May 16, 2016

Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention, security management
    
By: Forcepoint     Published Date: May 16, 2016

Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion detection, intrusion prevention
    
By: Forcepoint     Published Date: Apr 20, 2016

Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.

Tags : cyber security, security application, security, cybersecurity, data prevention, anti spam, anti spyware, anti virus, application security, email security, internet security, intrusion detection, intrusion prevention
    
By: Forcepoint     Published Date: Apr 20, 2016

Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.

Tags : security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security, internet security, intrusion prevention, security management
    
By: Forcepoint     Published Date: Apr 20, 2016

The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.

Tags : cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security, access control, anti spam, anti spyware, application security, internet security, intrusion detection, intrusion prevention, security management, security policies, data loss prevention
    
By: Forcepoint     Published Date: Apr 20, 2016

This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.

Tags : security, security protection, security architecture, security, protection, access control, anti spam, anti spyware, anti virus, application security, intrusion prevention, security management, security policies
    
By: Forcepoint     Published Date: Apr 20, 2016

Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.

Tags : risk, security, security programme, security, security application, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
    
By: Cisco     Published Date: Mar 16, 2016

This white paper published by Frost & Sullivan and Cisco examines the role, capabilities, and advantages of service providers in the DDoS mitigation process, as well as how this role might develop in the future.

Tags : service providers, ddos, security, cyber security, cyber threats, cyber attack, ddos attacks, access control, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention
    
By: Cisco     Published Date: Mar 16, 2016

This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.

Tags : cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services, access control, application security, internet security, intrusion prevention, security management
    
By: Hewlett Packard Enterprise     Published Date: Mar 14, 2016

IT’s next challenge: Responding to enterprise users who are more mobile-focused, tech-savvy and cloud-consumers. Download this infographic to learn 10 fast facts about endpoint data protection.

Tags : data protection, cloud-consumers, best practices, business technology, encryption, internet security, intrusion prevention, data loss prevention
    
By: Akamai Technologies     Published Date: Mar 10, 2016

When your Internet-facing network comes under DDoS attack, does your entire organization panic – or does everyone know exactly what to do? Read this whitepaper to learn how to protect network assets, websites, and web applications against DDoS attacks and best practices for adding DDoS mitigation to a corporate incident response plan.

Tags : ddos mitigation, best practices, akamai technology, cyberdefense, cyber security, anti spam, anti virus, ddos, hacker detection, internet security, intrusion detection, intrusion prevention
    
By: Logrhythm     Published Date: Feb 24, 2016

The time has come for CEOs and Boards to take personal responsibility for improving their companies’ cyber security. Global payment systems, private customer data, critical control systems, and core intellectual property are all at risk today. As cyber criminals step up their game, government regulators get more involved, litigators and courts wade in deeper, and the public learns more about cyber risks, corporate leaders will have to step up accordingly. This whitepaper focuses on the LogRhythm Security Intelligence Maturity Model, and how it is a valuable guide for building the necessary successive layers of threat detection and response capabilities. Download this paper now to find out more.

Tags : cyber attack, risk, cyber security, cyber criminals, cyber risks, security intelligence, threat detection, access control, anti spam, anti spyware, anti virus, application security, authentication, compliance, identity management, intrusion detection, intrusion prevention
    
By: Logrhythm     Published Date: Feb 24, 2016

In this webinar, learn how LogRhythm reduces mean time to detect (MTTD) and mean time to respond (MTTR) through machine-driven, real-time behavioral analytics, rapid forensic search and automated response.

Tags : logrhythm, cyber attacks, cyber threat, security, security application, application security, compliance, hacker detection, intrusion detection, intrusion prevention, security management, security policies
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

High-security mobility management is a subset of the enterprise mobility management market that serves organizations with the most-stringent requirements. If security is the highest priority, IT planners should pursue best-of-breed solutions for each platform they intend to support.

Tags : citrix, gartner, mdm, emm, intrusion prevention, security management, mobile computing, best practices, content delivery
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.