Intrusion Protection Reports

Magic Quadrant for Intrusion Prevention Systems
sponsored by Sourcefire
WHITE PAPER: This guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers
sponsored by Bit9, Inc.
CASE STUDY: Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.
Posted: 23 May 2012 | Published: 23 May 2012

Bit9, Inc.

Building a Strong and Effective Incident Response Plan
sponsored by ServiceNow
EGUIDE: Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.
Posted: 08 Feb 2021 | Published: 23 Oct 2019

ServiceNow

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
sponsored by OpenText Security Solutions
CASE STUDY: In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
Posted: 15 May 2013 | Published: 31 Dec 2012

OpenText Security Solutions

E-Guide: How antivirus software works: Virus detection techniques
sponsored by M86 Security
EGUIDE: Antivirus software uses several different virus detection techniques, as described in this tip by expert Lenny Zeltser.
Posted: 05 Oct 2011 | Published: 05 Oct 2011

M86 Security

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

The real need for distributed denial-of-service protection: How to stop DDoS attacks
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

TechTarget Security

SonicWALL TZ Series
sponsored by SonicWALL
WHITE PAPER: Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Stop strategies for preventing network intrusions
sponsored by Dell SecureWorks
EGUIDE: This expert E-Guide will provide you with the steps, processes, and prevention methods to maintain a secure network within your industry.
Posted: 06 Dec 2011 | Published: 05 Dec 2011

Dell SecureWorks