Network Intrusion Prevention Reports

Lumension Endpoint Security: Device Control and Application Control
sponsored by Lumension
TRIAL SOFTWARE: The increase of new technologies that enable remote data access 24x7, the escalating sophistication of cyber criminals and rising insider risks have forced organizations to change their approach to endpoint security and data protection.
Posted: 13 Sep 2010 | Premiered: 13 Sep 2010

Lumension

How a next-generation firewall prevents application-layer attacks
sponsored by TechTarget Security
EGUIDE: The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

TechTarget Security

Threat Detection (Antivirus Intrusion Prevention)
sponsored by TechTarget Security
EBOOK: Antivirus and intrusion prevention aren't the threat detection stalwarts they used to be. Check out this Information Security Essential Guide to uncover how vendors are responding to the growing threat landscape and the options available to help you counter modern-day attacks.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Security

iSensor specifications
sponsored by DellEMC and Intel®
DATA SHEET: Organizations need advanced security technology, strong security expertise and 24x7 vigilance to safeguard their networks and IT systems. This data sheet offers an overview and specifications of Dell SecureWorks’ proprietary network intrusion prevention appliance, iSensor. Learn about its key features and how it can protect your networks.
Posted: 18 May 2011 | Published: 18 May 2011

DellEMC and Intel®

The Future of Security: Advanced Security Analytics
sponsored by LogRhythm, Inc.
EGUIDE: As security attacks have grown in numbers and complexity over the past few years, security efforts have evolved in the same measure. Advanced security analytics is the next step in cybersecurity. Learn how to shift from a reactive to a proactive approach and what the future of security holds.
Posted: 23 Nov 2016 | Published: 22 Nov 2016

LogRhythm, Inc.

A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE: Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013

Dell KACE

Understanding WMI Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Stop strategies for preventing network intrusions
sponsored by Dell SecureWorks
EGUIDE: This expert E-Guide will provide you with the steps, processes, and prevention methods to maintain a secure network within your industry.
Posted: 06 Dec 2011 | Published: 05 Dec 2011

Dell SecureWorks

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Intelligent real-time protection and application control
sponsored by SonicWALL
WHITE PAPER: It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SonicWALL