Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

intrusion

Results 176 - 200 of 201Sort Results By: Published Date | Title | Company Name
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
Click here and get a head start on these Hackers by learning how they are turning their attention to new ways to deliver viruses, crash unsuspecting users’ computers, and steal social security numbers, passwords, bank account numbers, etc.
Tags : 
vulnerability, hacker, hacker detection, hacker prevention, ips, intrusion prevention, intrusion detection, ids
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : 
patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
Before Microsoft released Microsoft XP Service Pack 2 (SP2), most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. Newer attack methods were starting to be seen where the attacker would take advantage of vulnerabilities within the Internet browser itself.
Tags : 
virus, anti-virus, anti virus, spyware, windows xp, xp sp2, intrusion detection, ids
    
Perimeter
Published By: Asentria Corporation     Published Date: Sep 04, 2007
More than ever before, IT managers need to secure equipment and facilities against a variety of intrusive conditions that could cripple critical operations, resulting in system malfunctions, loss of data or intellectual property, damage to mission critical hardware or even theft of valuable physical assets. Such conditions often include environmental events, failure of air conditioning systems, power outages, and untoward human actions.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures
    
Asentria Corporation
Published By: Technolytics     Published Date: Oct 05, 2007
Recently, a series of cyber attacks on the Defense Department and Defense contractors in the United States as well as the Ministry of Defense and Parliament in the U.K. have created significant cause-for-concern by computer security experts. It is imperative you read this brief and learn how we're all vulnerable and what is being done to prevent these Cyber Attacks.
Tags : 
spy ops, spy-ops, cyber attack, hacker, hackers, government, internet security, national security
    
Technolytics
Published By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : 
authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation
    
Netwrix
Published By: Microworld     Published Date: Dec 12, 2007
NILP from MicroWorld is an advanced, next generation technology that detects Spam and Phishing mails using unique algorithms. Before we see how NILP works, let’s first check out the magnitude of spam trouble and why traditional methods are failing to counter it.
Tags : 
spam, email security, anti-spam, anti spam, email, intrusion prevention, mail scan, mailscan
    
Microworld
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies
Published By: Symantec.cloud     Published Date: Jan 26, 2011
Growing businesses face real difficulties in protecting their users, especially remote workers, while keeping management costs down.Understand the challenges of delivering endpoint security in an increasingly mobile environment.
Tags : 
symantec cloud, endpoint security, remote worker, mobile environment, spyware, intrusion, remote access, remote network management
    
Symantec.cloud
Published By: Integrated Business Services, Inc.     Published Date: Jun 06, 2011
An article exploring the new Web 2.0 threats to organizations.
Tags : 
it security, data loss prevention, intrusion protection, breach, bots, mobiliti
    
Integrated Business Services, Inc.
Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Directors agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention, security
    
Mimecast
Published By: AlienVault     Published Date: Aug 11, 2015
This webinar talks about common browser vulnerabilities used to execute attacks, what attackers do next to take control of the system, and how to catch it before the attacker moves further into your network
Tags : 
end-user protection, cyberattacks, browser vulnerabilities, security management, modern threats, threat sharing, security products, firewall
    
AlienVault
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking communitywhere they are well known and have been in widespread use for several yearsthere are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
McAfee
Published By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Heres advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, networking
    
McAfee
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking communitywhere they are well known and have been in widespread use for several yearsthere are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
Intel Security
Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book youll find out all about AETs, and get useful pointers and advice to help you secure your organization. If youre working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what youre up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security
Published By: IBM     Published Date: Jul 15, 2016
Discover the new Zero Trust Model approach to security and how intrusion prevent systems (IPS) are important due to its visibility, alerting and protection capabilities.
Tags : 
technology, security, information technology, best practices, ips, zero trust model
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Do Androids dessert-named updates improve device and data security enough to work for the enterprise? Android has long ruled the consumer market. Now, the latest security advancements from Google and device manufacturers, and support for Android by leading EMM solution providers, are expanding its presence in the enterprise. To help ensure security and compliance with industry standards and government regulations, enterprises need a way to protect and manage the wide range of available devices, versions, and idiosyncrasies of the worlds most popular mobile operating system.
Tags : 
access management, security information, event management, database security, application development, risk management, endpoint management, next generation intrusion protection
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Essentials for your organizations first MDM deployment. IBMs security platform provides the security intelligence to help organizations holistically protect their people, data, applications and infrastructure. IBM offers solutions for identity and access management, security information and event management, database security, application development, risk management, endpoint management, next-generation intrusion protection and more. IBM operates one of the worlds broadest security research and development, and delivery organizations.
Tags : 
mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data
    
IBM
Published By: IBM     Published Date: Oct 26, 2017
Threats to your digital assets are everywhere. Theyre constant. So you build defenses to keep them out. But like a carpenter framing a new addition to a house, you want to regularly step back from working on the details for a full view of your work. Do the enterprise security measures youve built do a complete job of protecting against intrusions? Or have you left any gaps that allow bad actors an easy way in? When you check all the possibilities, you might be surprised.
Tags : 
data protection, sensitive data, data security, identity governance, digital assets
    
IBM
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologiesincluding both public and private clouds. Youll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you wont be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Published By: Cisco EMEA     Published Date: May 15, 2018
Il Gruppo Marcegaglia conferma una strategia di sicurezza IT basata su soluzioni Cisco che va dagli strumenti di firewall al sistema di Next-Generation Intrusion Prevention System passando per la gestione centralizzata. Il Gruppo Marcegaglia la realt industriale leader mondiale nella trasformazione dellacciaio che opera dallItalia a livello globale, con una presenza di 43 stabilimenti distribuiti su una superficie complessiva di 6 milioni di metri quadrati. Fanno parte del Gruppo 7.000 dipendenti, 60 unit e 210 rappresentanze commerciali per un fatturato che, nel 2013, stato di oltre 4 miliardi di euro nel settore dellacciaio e diversificate. Il tutto grazie alla produzione quotidiana di 5.500 chilometri di manufatti in acciaio inossidabile e al carbonio per oltre 15.000 clienti, per un totale di oltre 5 milioni di tonnellate lavorate ogni anno.
Tags : 
    
Cisco EMEA
Published By: IBM     Published Date: Jun 05, 2018
System vulnerabilities, ransomware, malware, intrusions, and other malicious activities are on the rise, showing that todays cybersecurity professionals are hard-pressed to keep enterprises secure. Although threats are growing in sophistication and attack vectors are expanding, many of the intrusions and cyber attacks happening today are simply a result of improper protections being put in place, systems going unpatched, or weak security policies. While much of the blame is being placed on cybersecurity professionals, the real blame should often be placed upon the tools and policies that many of those professionals have come to trust and the complexity that comes with them.
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.