Network Intrusion Detection Reports

Intrusion Detection and Prevention: Decision Time
sponsored by TechTarget Security
EBOOK: Learn how to evaluate your potential vendor's IDS/IPS product and its ability to meet your specific business requirements.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

TechTarget Security

IT Decision Checklist: Messaging Security
sponsored by TechTarget Security
EGUIDE: Read this paper to learn how companies face complicated buying decisions when it comes to buying messaging security, the most important being whether to go with an on-premise solution, a SaaS offering in the cloud, or both.
Posted: 03 Mar 2010 | Published: 03 Mar 2010

TechTarget Security

Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008

Cisco Systems, Inc.

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company

Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE: In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Imperva

Multi Stage Filtering
sponsored by APCON, Inc.
WHITE PAPER: This informative guide explores the current challenges networks face when it comes to increased traffic and how effective packet filtering can help you.
Posted: 07 May 2014 | Published: 07 May 2014

APCON, Inc.

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by IBM
EGUIDE: In this e-guide, you will learn about practical strategies for implementing insider threat detection tools. Also covered in this e-guide are the three common types of insider crimes and how each one requires its own set of insider threat detection tactics. Read on to learn more about monitoring strategies for insider threat detection.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Vendor Landscape: Intrusion Detection and Prevention Systems
sponsored by IBM
WHITE PAPER: This comprehensive resource compares 12 competitors in the Intrusion Detection and Prevention Systems (IDPS) market, providing a number of tools for comparing and evaluating each vendor's solution in order to determine the best fit for your enterprise's needs.
Posted: 28 Aug 2014 | Published: 31 Dec 2013

IBM

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise