Network Intrusion Prevention Reports

Infographic: 4 types of ransomware
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Ransomware is one of the most effective strategies for attacking critical infrastructures. This type of malware infects computers and prohibits or severely restricts users from accessing entire systems until ransom demands have been met. In this infographic, we take a look at the four types of ransomware and their effect on the security landscape.
Posted: 16 Nov 2021 | Published: 16 Nov 2021

TechTarget ComputerWeekly.com

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
sponsored by SonicWALL
BROCHURE: This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
Posted: 24 Jul 2009 | Published: 24 Jul 2009

SonicWALL

Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER: This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007

IBM

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008

Symantec Corporation

Demo: Tivoli Identity Manager Express - Highlighting Security and Identity Management
sponsored by IBM
SOFTWARE DEMO: This multi-part demonstration highlights the security and identity management functions, features, and value of IBM Tivoli Identity Manager Express, including how it can benefit your organization's endpoint security.
Posted: 13 Mar 2009 | Premiered: 13 Mar 2009

IBM

The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER: Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Kaspersky

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

Managed SSL VPN Remote Access
sponsored by Virtela Communications, Inc.
DATA SHEET: Virtela's SSL VPN Remote Access Services provide end-users the security of a completely encrypted network with the flexibility to access resources from any SSL enabled browser.
Posted: 03 Mar 2008 | Published: 01 Feb 2008

Virtela Communications, Inc.