Intrusion Protection Reports

Infographic: 4 types of ransomware
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.
Posted: 16 Nov 2021 | Published: 16 Nov 2021

TechTarget ComputerWeekly.com

iSensor specifications
sponsored by DellEMC and Intel®
DATA SHEET: Organizations need advanced security technology, strong security expertise and 24x7 vigilance to safeguard their networks and IT systems. This data sheet offers an overview and specifications of Dell SecureWorks’ proprietary network intrusion prevention appliance, iSensor. Learn about its key features and how it can protect your networks.
Posted: 18 May 2011 | Published: 18 May 2011

DellEMC and Intel®

Security for a Faster World
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This eBook presents a maturity model that will help you determine how secure you really are, explores five questions every CIO should be able to answer, and outlines a new approach based on intelligence gathering and research that can keep you ahead of the cybercriminals.
Posted: 19 Aug 2014 | Published: 13 Jun 2013

Hewlett Packard Enterprise

Information Security ANZ March 2016
sponsored by TechTarget
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016

TechTarget

Next-generation capabilities of enterprise application-aware firewalls
sponsored by SonicWALL
EGUIDE: The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

The Benefits of Automating Security with SOAR Tools
sponsored by ServiceNow
EGUIDE: Security professionals are struggling to keep up with today's threat landscape as they continue to deal with security alert overload and the cybersecurity skills shortage. However, deploying SOAR tools can aid security teams with improving everyday processes. In this e-guide, learn how SOAR tools can improve your cybersecurity program.
Posted: 08 Feb 2021 | Published: 25 Oct 2019

ServiceNow

IDS vs. IPS
sponsored by Sourcefire
EGUIDE: When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
Posted: 29 Apr 2011 | Published: 29 Apr 2011

Sourcefire

SonicWALL TZ Series
sponsored by SonicWALL
WHITE PAPER: Factors like Web 2.0 applications, streaming video, evolving threats and new threat delivery vectors are overwhelming both the security and performance of traditional firewalls.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Intrusion Detection and Prevention: RFP Technology Decisions
sponsored by TechTarget Security
EBOOK: To properly evaluate IDS/IPS products, you must understand vendor offerings and how well they fit with your organization.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

TechTarget Security