Network Intrusion Detection Reports

Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE: This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009

Information Security Magazine

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

Google Apps

Manage Data Security and Application Threats with a Multi-Tiered Approach
sponsored by IBM
WHITE PAPER: This resource introduces a portfolio of security tools that work together to provide the layered, multi-tier data and application protection that you're looking for.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

IDS vs. IPS
sponsored by Sourcefire
EGUIDE: When it comes to intrusion detection systems (IDS) and intrusion prevention systems (IPS) it’s not always easy for organizations to determine what functions each can be used for. This expert tip compares the features and capabilities of IDS and IPS technologies and highlights popular use cases for each system.
Posted: 29 Apr 2011 | Published: 29 Apr 2011

Sourcefire

Information Security IT Decision Checklist: Security Information and Event Management
sponsored by ArcSight, an HP Company
EGUIDE: This Information Security IT Decision Checklist explores key business and technical areas you should consider before selecting a security information and event management system. Also included in this guide is a list of SIMs and log management vendors to help in your decision process.
Posted: 28 Jul 2011 | Published: 28 Jul 2011

ArcSight, an HP Company

Information Security Magazine - March 2010: Linking ‘Who’ and ‘What’
sponsored by Information Security Magazine
EZINE: This month’s cover story, “Linking ‘Who’ and ‘What’”, explains the new trend of joining SIM and IAM strategies to tie system vulnerabilities and policy violations to the user activity that causes them. Other articles in this month’s issue cover topics such as security management, vulnerability assessment, compliance, and more.
Posted: 09 Mar 2010 | Published: 09 Mar 2010

Information Security Magazine

Independent Lab Test Report: Security of Cisco CallManager-based IP Telephony against Malicious Hacker Attacks
sponsored by Cisco Systems, Inc.
ANALYST REPORT: Cisco Systems becomes the first, and to date the only, IP-Telephony vendor to earn Miercom's highest rating of Secure for its proven ability to defend an IP phone system against malicious attack.
Posted: 10 Aug 2004 | Published: 24 May 2004

Cisco Systems, Inc.

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Is Your Platform Secure? Really?
sponsored by IBM
WHITE PAPER: This resource analyzes three of today's top platforms, IBM Power, x86, and UNIX, revealing how their built-in security components fared based upon both business and technical perspectives.
Posted: 17 Jul 2013 | Published: 17 Jul 2013

IBM

How to collect Windows Event logs to detect a targeted attack
sponsored by M86 Security
EGUIDE: Targeted attacks are growing, and eventually your enterprise will be a target. In this e-guide, expert Richard Bejtlich covers how to collect Windows Event logs to detect an intrusion.
Posted: 13 Jul 2011 | Published: 13 Jul 2011

M86 Security