Host Intrusion Detection Reports

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.

Assessing the Value of Cloud Security Threat Intelligence Services
sponsored by Hewlett Packard Enterprise
EGUIDE: This expert E-Guide deep dives into what a global threat intelligence service is, how well the services perform and if they are worth the investment. Read on to learn more.
Posted: 24 Apr 2013 | Published: 24 Apr 2013

Hewlett Packard Enterprise

Mobile: The Technology Game-Changer in 2013
sponsored by TechTarget Security
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security

GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware
sponsored by GlobalSign
WHITE PAPER: This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.
Posted: 17 May 2011 | Published: 17 May 2011

GlobalSign

Advanced Persistent Threats: Detection, Protection and Prevention
sponsored by Sophos
WHITE PAPER: Download this paper to get an overview of the common characteristics of APTs, how they typically work, and how Sophos complete security solution can protect your network, servers and end user clients.
Posted: 08 Apr 2014 | Published: 08 Apr 2014

Sophos

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Understanding WMI Malware
sponsored by Trend Micro, Inc.
WHITE PAPER: This research paper will discuss how cybercriminals used Windows Management Instrumentation (WMI) as a venue to conveniently perform malicious activities on affected users' systems. The findings in this paper were based on a client-submitted case that TrendLabs engineers handled this March.
Posted: 26 Oct 2010 | Published: 26 Oct 2010

Trend Micro, Inc.

Stopping Fake Antivirus: How to Keep Scareware off Your Network
sponsored by Sophos
WHITE PAPER: This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
Posted: 04 Oct 2011 | Published: 01 Sep 2011

Sophos

Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER: According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009

IBM

E-Guide: Clearing Up the Confusion to Prepare for APTs
sponsored by Dell SecureWorks
EGUIDE: Consult this expert e-guide today to learn about the critical risks that cyberwar and advanced persistent threats (APTs) pose to your organization. Discover essential strategies for mitigating these risks by reading on now.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

Dell SecureWorks