IPS Reports

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Intrusion prevention service with iSensor
sponsored by DellEMC and Intel®
WHITE PAPER: Anti-virus and firewalls technologies are not enough to protect your business from emerging threats. Discover an advanced security solution that offers intrusion prevention services to help monitor your network and deliver exceptional threat protection. Read this paper to learn how to stay ahead of the latest threats and secure your networks.
Posted: 18 May 2011 | Published: 18 May 2011

DellEMC and Intel®

Next-Generation IPS for Dummies
sponsored by Sourcefire
EBOOK: Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.
Posted: 30 Apr 2013 | Published: 01 Jan 2013

Sourcefire

Unified Security Management: Real-time Threat Detection
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AT&T Cybersecurity

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 06 Jul 2014 | Published: 02 Jul 2014

Sophos

The real need for distributed denial-of-service protection: How to stop DDoS attacks
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the immediate need for DDoS protection services and what you put at risk by not protecting your organization today. Uncover how these attacks work, the damage they can cause and best practices to stop them.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

TechTarget Security

Supporting the Zero Trust Model of Information Security
sponsored by IBM
WHITE PAPER: This Forrester Research, Inc. report introduces a zero trust model to reduce risk of insider and outsider threats. Learn about this security strategy's 3 main concepts, and discover how the intrusion prevention system (IPS) can be used to fulfill this model.
Posted: 20 Feb 2014 | Published: 30 Sep 2013

IBM

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

NSS Labs Network Intrusion Prevention System Product Analysis
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM