2,156 Results for:Network intrusion detection and prevention (IDS-IPS)

  • Filter by: 

Magic Quadrant for Intrusion Detection and Prevention Systems

sponsored by Alert Logic Published: 10 Jan 2018 Research Content

Did you know by 2020, 70% of new stand-alone intrusion detection and prevention systems (IDPS) placements will be cloud-based? Inside this Gartner Magic Quadrant Report, uncover the pros and cons of IDPS providers ...

View Now

App-ID Tech Brief: Traffic classification that identifies applications traversing your network

sponsored by Palo Alto Networks Published: 29 Nov 2017 White Paper

In this technology brief, learn about App-ID, a patented traffic classification technology that identifies applications traversing your network. Find out how App-ID enables creation and enforcement of safe ...

View Now

IP Networking Comparison Guide for the Transformational Enterprise

sponsored by Juniper Networks, Inc. Published: 14 Mar 2018 White Paper

This IDG Research guide compares IP networking solutions from Juniper, Cisco, Extreme (Brocade), Arista, and HP. Learn about the 4 key areas driving enterprise network priorities, the capabilities necessary to ...

View Now

Malware Prevention vs. Detect and Respond

sponsored by Dell EMC and Microsoft Published: 05 Jan 2017 White Paper

Access this white paper to examine current attack detection strategies that are rapidly gaining popularity, as well as the pitfalls of pure post-execution strategies. You will also get to the core of the malware ...

View Now

Overview: TELoIP SD-WAN Technology

sponsored by TELoIP Inc. Published: 24 Jul 2017 Data Sheet

In this data sheet, learn how TELoIP's SD-WAN tools help with optimizing your users' quality of experience, custom dashboard views with integrated diagnostic tools, and more.

View Now

It's Time to Take a Proactive Approach to Threat Detection and Prevention

sponsored by IBM Published: 09 Mar 2018 White Paper

According to Ponemon, $3.62 million is the average total cost of a data breach. This resource offers a proactive approach to threat detection and prevention to avoid costly and damaging data breaches.

View Now

Bringing Next-Generation Performance and Efficiency to Your Network

sponsored by TELoIP Inc. Published: 20 Jul 2017 White Paper

Learn how the TELoIP Cloud can unify all branch traffic into a single cloud-managed SD-WAN overlay connection, while providing both WAN and internet optimization, aligning network services to user, application and ...

View Now

Machine Learning: The Secret Ingredient for Detecting and Preventing Fraud

sponsored by Simility Published: 05 Feb 2018 White Paper

In a business environment where everything is increasingly digital and shared, companies need advanced analytic techniques like machine learning to combat bad users. This white paper offers traditional approaches ...

View Now

Visibility, Detection and Control for Industrial Networks

sponsored by SecurityMatters Published: 09 Feb 2018 Resource

This resource reveals how to improve network security with strategies such as visibility, threat detection capabilities and control.

View Now

BIT IP Connect: Networks That Think

sponsored by BT Published: 22 Nov 2017 Resource

Today, the "network" is fundamental to any organization. In this resource, learn about IP Connect UK, an IP VPN tool for your voice, data and video applications that helps you connect locally, nationally and around...

View Now