2,605 Results for:Network intrusion detection and prevention (IDS-IPS)

  • Filter by: 

Magic Quadrant for Intrusion Detection and Prevention Systems

sponsored by Alert Logic Published: 10 Jan 2018 Research Content

Did you know by 2020, 70% of new stand-alone intrusion detection and prevention systems (IDPS) placements will be cloud-based? Inside this Gartner Magic Quadrant Report, uncover the pros and cons of IDPS providers ...

View Now

100G+ IDS/IPS Solutions that Enable Monitoring

sponsored by ADLINK Technology Published: 09 Aug 2018 Resource

In this resource you can learn about traditional detection technologies, challenges of protecting web-based networks, user-based behavioral analysis to detect abnormal behavior, and more.

View Now

App-ID Tech Brief: Traffic classification that identifies applications traversing your network

sponsored by Palo Alto Networks Published: 29 Nov 2017 White Paper

In this technology brief, learn about App-ID, a patented traffic classification technology that identifies applications traversing your network. Find out how App-ID enables creation and enforcement of safe ...

View Now

IP Networking Comparison Guide for the Transformational Enterprise

sponsored by Juniper Networks, Inc. Published: 14 Mar 2018 White Paper

This IDG Research guide compares IP networking solutions from Juniper, Cisco, Extreme (Brocade), Arista, and HP. Learn about the 4 key areas driving enterprise network priorities, the capabilities necessary to ...

View Now

Malware Prevention vs. Detect and Respond

sponsored by Dell EMC and Microsoft Published: 05 Jan 2017 White Paper

Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware ...

View Now

Overview: TELoIP SD-WAN Technology

sponsored by TELoIP Inc. Published: 24 Jul 2017 Data Sheet

In this data sheet, learn how TELoIP's SD-WAN tools help with optimizing your users' quality of experience, custom dashboard views with integrated diagnostic tools, and more.

View Now

Coordinate Network Security Tools for a Unified Defense

sponsored by Ixia - Keysight Published: 31 Dec 2017 White Paper

Find out how to extend the reach of security tools to access the entire network, coordinating intrusion prevention/detection systems (IPS/IDS), data loss prevention (DLP), and firewalls into a single, staunch line ...

View Now

It's Time to Take a Proactive Approach to Threat Detection and Prevention

sponsored by IBM Published: 09 Mar 2018 White Paper

According to Ponemon, $3.62 million is the average total cost of a data breach. This resource offers a proactive approach to threat detection and prevention to avoid costly and damaging data breaches.

View Now

Preventing Sophisticated Attacks on the Network

sponsored by Forcepoint Published: 31 Aug 2018 White Paper

This white paper explores how to defend against advanced evasion techniques (AET) and other persistent threats with a next-gen firewall (NGFW) that applies sophisticated analytics to threat detection. Find out how ...

View Now

Machine Learning: The Secret Ingredient for Detecting and Preventing Fraud

sponsored by Simility Published: 05 Feb 2018 White Paper

In a business environment where everything is increasingly digital and shared, companies need advanced analytic techniques like machine learning to combat bad users. This white paper offers traditional approaches ...

View Now