Intrusion Prevention White Papers

An Intrusion Prevention System is any device which exercises access control to protect computers from exploitation. "Intrusion prevention" technology is considered by some to be an extension of intrusion detection (IDS) technology, but it is actually another form of access control, like an application layer firewall. The latest Next Generation Firewalls leverage their existing deep packet inspection engine by sharing this functionality with an Intrusion-prevention system.
Results 1 - 25 of 538Sort Results By: Published Date | Title | Company Name
By: Nuance Communications     Published Date: Jun 17, 2009

The response to possible bank card fraud is one of the most important factors affecting the relationship that customers have with their bank. For customer-centric financial institutions who issue millions of bank cards, any instance of possible fraud is both a business risk to be managed and an opportunity to strengthen customer relationships.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, business risk, identity management, internet security, intrusion prevention, security management, security policies, web service security, ebusiness
    
By: iboss     Published Date: Jan 22, 2018

Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.

Tags : iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention, ssl, wireless security, data protection
    
By: iboss     Published Date: Jan 22, 2018

While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.

Tags : iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, wireless security, data protection, business technology, mobile device management
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security, hacker detection, intrusion prevention, web service security, data loss prevention
    
By: Thales     Published Date: Jul 13, 2017

Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.

Tags : thales, data protection, health records, data security, hippa, hacker detection, intrusion prevention, best practices, records management, data loss prevention
    
By: Proofpoint     Published Date: May 17, 2017

In this complimentary guide you will learn why ransomware is surging and what to do before, during, and after an attack.

Tags : proofpoint, ransomware, intrusion prevention, cyberattack, data protection, network security, encryption, wireless security, it spending, email archiving, vulnerability management, business technology
    
By: Kaspersky     Published Date: Feb 06, 2017

As its name suggests, ransomware is a specific type of malware that tries to extract a ransom payment in exchange for unblocking access to an asset that belongs to the victim. Download our eBook now to learn how to protect your business from this security threat.

Tags : ransomware, malware, encryption, cyberthreat, hacker detection, intrusion prevention, mobile data systems, smart phones, wireless security, data protection, database security
    
By: Kaspersky     Published Date: Feb 06, 2017

The total amount of damage caused by cryptomalware can be divided into two parts: the ransom and the related losses. Drawing from our survey of over 4,000 small- and medium-sized companies conducted by Kaspersky Lab and B2B International, we take a closer look at the numbers behind the damage.

Tags : cryptor, ransomware, malware, encryption, business security, cyberthreat, cyberattack, hacker detection, intrusion prevention, data protection, database security
    
By: GE Power     Published Date: Jan 27, 2017

Don’t wait to implement your cyber protection program. An excellent place to begin developing your approach is with the newly published The U.S. Homeland Security Strategies for Defending Industrial Control Systems. See the 7 recommended strategies and learn and how digital solutions can help fulfill steps toward a more secure operating environment.

Tags : cyber security, power plants, utilities, power producers, power plant, cyber attacks, power grids, power industry, power plant software, us homeland security, cyber security strategy, powerplant security, powerplants, cyber security assessment, network security, hacker detection, intrusion detection, intrusion prevention, security policies, data protection
    
By: Secureworks     Published Date: Nov 11, 2016

To ensure that “quasi-insiders” or third parties do not contribute to your enterprise’s attack vector, it’s imperative to develop a third-party governance process to mitigate risk. Read on to find out how.

Tags : managed security services, risk management, security, threat and vulnerability management, attacks, insider attacks, cyber security, intrusion prevention, vulnerability management
    
By: Kaspersky     Published Date: Oct 26, 2016

Download our eBook Healthcare Ransomware: Hospitals on Hold to learn the measures your hospital or healthcare organization can put in place to ensure that this menace does not happen to you.

Tags : kaspersky, hospital records, healthcare security, secure data, cybercrime, hacker detection, intrusion detection, intrusion prevention, data protection, records management, data loss prevention
    
By: Entrust Datacard     Published Date: Sep 28, 2016

This guide describes the technical and business impact of SHA-1 migration as it pertains to SSL certificates only. It will outline a recommended migration path to minimise the cost and operational impact of replacing affected SSL certificates.

Tags : security, security application, ssl, ssl certificates, sha, application security, compliance, intrusion detection, intrusion prevention, security management, security policies
    
By: Kaspersky     Published Date: Aug 17, 2016

Find the answers you need to know by downloading our new ebook. We’ll break down the statistics on the biggest threats that enterprises face and how you can defend your business.

Tags : kaspersky, threat management, vulnerability, external threat, hacker detection, intrusion prevention, it spending, data protection, vulnerability management
    
By: Kaspersky     Published Date: Jul 22, 2016

Learn how you can maximize the performance and security of your virtualized machines.

Tags : kaspersky, virtual security, virtual environment, data breach, data protection, network security, email security, intrusion prevention, wireless security, server virtualization, data loss prevention
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.

Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware, anti virus, application security, encryption, internet security, intrusion detection, intrusion prevention, security management, data loss prevention
    
By: Forcepoint     Published Date: May 16, 2016

Die finanziellen und rechtlichen Konsequenzen der während des vergangenen Jahres verzeichneten öffentlichkeitswirksamen Cyber-Angriffe enthalten eine unmissverständliche Botschaft: Datenraub kann so gravierend sein, dass die Unternehmensleitung es sich nicht leisten kann, das Thema zu ignorieren. Der Bericht "Cybersicherheit und Schutz vor Datendiebstahl" bietet einen Überblick über das Thema, der ohne technisches Fachjargon auskommt. Er liefert Anhaltspunkte die jedes Mitglied eines Vorstands, Aufsichtsrats oder Direktoriums nutzen kann, um die Sicherheitsposition der eigenen Organisation auf den Prüfstand zu stellen.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, access control, anti spam, anti spyware, anti virus, application security, internet security, intrusion detection, intrusion prevention, security management
    
By: Forcepoint     Published Date: May 16, 2016

Les ramifications financières et juridiques des cyber-incidents hautement médiatisés de l’année dernière ont envoyé un message clair : le vol de données est trop important pour que le Conseil d’administration ne soit pas impliqué. Le rapport « Cybersécurité et prévention du vol de données » fournit une vue d'ensemble non technique que chaque Conseil d'administration peut utiliser pour évaluer les mesures de sécurité actuelles de sa société.

Tags : cyber security, security, cybersecurity, security application, data theft prevention, data security, cyberttacks, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion detection, intrusion prevention
    
By: Kaspersky     Published Date: May 11, 2016

You don't have to be a victim of ransomware. Get the facts you need to protect your company.

Tags : kaspersky, ransomware, encyyption, data access, email security, company security, network security, access control, encryption, hacker detection, intrusion prevention, wireless security, data protection, mobile device management
    
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security, network security, email security, firewalls, hacker detection, internet security, intrusion prevention, security policies, wireless security, return on investment, business technology, data loss prevention
    
By: Forcepoint     Published Date: Apr 20, 2016

Je länger sich Angreifer in Ihren Netzwerk aufhalten, desto mehr laterale Bewegung ist möglich - und desto größer ist auch das Risiko eines Datendiebstahls. Ein realistischer Ansatz für Datensicherheit und eine Reduzierung der Verweildauer in Ihrem Netzwerk konzentriert sich weniger darauf, eine mögliche Datenkompromittierung zu vermeiden, sondern sorgt vielmehr dafür, dass Daten niemals aus Ihrem Netzwerk herausgeschleust werden können.

Tags : cyber security, security application, security, cybersecurity, data prevention, anti spam, anti spyware, anti virus, application security, email security, internet security, intrusion detection, intrusion prevention
    
By: Forcepoint     Published Date: Apr 20, 2016

Nel 2014, le violazioni dei dati hanno compromesso più di 700 milioni di informazioni, con perdite finanziarie stimate di almeno 400 milioni di dollari e gli incidenti di sicurezza sono aumentati fino al 66%. Ma non lasciare che la paura soffochi la crescita. Il report “Data Theft Prevention” si concentra su come innovare in completa sicurezza da una prospettiva più ampia, più mirata e più intelligente nell'applicazione.

Tags : security, data theft prevention, data security, security application, anti spam, anti spyware, anti virus, application security, internet security, intrusion prevention, security management
    
By: Forcepoint     Published Date: Apr 20, 2016

The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.

Tags : cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security, access control, anti spam, anti spyware, application security, internet security, intrusion detection, intrusion prevention, security management, security policies, data loss prevention
    
By: Forcepoint     Published Date: Apr 20, 2016

This will appear under the headline in some cases; in other cases, just the long description will appear. Both descriptions should work independently of each other and not be super redundant if possible: Relying on point products to protect your network is a losing strategy. Having tools than your IT team can handle raises costs, complexity and risk. Deploying enterprise security architecture with control over enforcement, coordination, end-to-end visibility and process automation from a single pane of glass, is the winning approach.

Tags : security, security protection, security architecture, security, protection, access control, anti spam, anti spyware, anti virus, application security, intrusion prevention, security management, security policies
    
By: Forcepoint     Published Date: Apr 20, 2016

Innovative practices lead to innovative results. Using our pillars to build a security program helps businesses develop user visibility and behavioral context. Total awareness — “seeing” the extent of your user behavior — starts with five pillars and ends with unquestioned success.

Tags : risk, security, security programme, security, security application, anti spam, anti spyware, anti virus, application security, identity management, internet security, intrusion detection, intrusion prevention, security management, security policies
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.