Network Intrusion Prevention Reports

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise

Top 5 Threat Protection Best Practices
sponsored by Sophos
WHITE PAPER: The following top five best practices offer advice to help you protect your endpoints and your network against an ever-growing body of threats.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Sophos

Anti-Evasion: Why It’s a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: This resource explores anti-evasion technology, an intrusion prevention system (IPS) add-on that blocks encoded attacks more effectively than traditional solutions.
Posted: 28 Feb 2014 | Published: 31 Dec 2013

DellEMC and Intel®

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

How a next-generation firewall prevents application-layer attacks
sponsored by TechTarget Security
EGUIDE: The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

TechTarget Security

Understanding WMI Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Information Security ANZ July 2015
sponsored by TechTarget
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget

2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER: This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013

Symantec Corporation

Security considerations for small and medium-sized enterprises (SMEs)
sponsored by GFI Software
WHITE PAPER: SMEs are just as vulnerable to security breaches as any other enterprise, but often times they consider security only as an afterthought. View this paper to explore key security challenges for SMEs and the necessary tools and policies for effective protection.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

GFI Software

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos