Network IDS Reports

Detecting and Preventing Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
Posted: 30 Apr 2014 | Published: 30 Apr 2014

LogRhythm, Inc.

Enterprise Security and your Technology
sponsored by Hewlett Packard Enterprise
WEBCAST: This informative resource outlines a top-tier security tool and explains how it can help secure your enterprise.
Posted: 09 Jun 2014 | Premiered: Jun 9, 2014

Hewlett Packard Enterprise

Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE: This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009

Information Security Magazine

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise

The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
sponsored by SonicWALL
BROCHURE: This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
Posted: 24 Jul 2009 | Published: 24 Jul 2009

SonicWALL

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

IDS vs. IPS
sponsored by Sourcefire
EGUIDE: When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
Posted: 29 Apr 2011 | Published: 29 Apr 2011

Sourcefire

Alternatives for Securing Virtual Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.

Unified Security Management: Real-time Threat Detection
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: This free trial software allows unifies tools for intrusion detection, asset discovery, vulnerability scans, real-time threat intelligence, and SIEM/event correlation in one easy-to-use and affordable solution.
Posted: 24 Mar 2014 | Premiered: 24 Mar 2014

AT&T Cybersecurity