hacker detection

Results 1 - 25 of 27Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Sep 15, 2014
Attacks today incorporate increasingly sophisticated methods of social engineering and client-side software manipulation to exfiltrate data without detection. Some attackers leverage so-called spearphishing to entice employees to give up access information and spread their attacks to other enterprise systems; others use password crackers against compromised applications in order to gain further access rights to the network. The attackers might also set up channels for command and control communications with the compromised systems, as in the case of the Zeus or SpyEye bot infections.
Tags : network protection, it security, firewall, hacker detection, security management
     McAfee
By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network survival, network security management, best practices, firewalls, hacker detection
     McAfee
By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : best practices, network security, it security, security management, threat response, hacker detection
     McAfee
By: McAfee     Published Date: Sep 15, 2014
Advanced evasion techniques, or AETs, are delivery mechanisms used to disguise advanced persistent threats (APTs) and permit them to slip through network security undetected. AETs work by splitting up malicious payloads into smaller pieces, disguising them, and delivering them simultaneously across multiple and rarely used protocols. Once inside, AETs reassemble to unleash malware and continue an APT attack.
Tags : hacker detection, advanced evasion techniques, network security, it security, security management
     McAfee
By: Tripwire     Published Date: Feb 08, 2013
Cyberwar fundamentally changes how government must handle security. Firewalls, intrusion detection systems and other security devices can stop the average hacker, but new threats use stealth techniques that these defenses cannot detect on their own.
Tags : cyberwar, hacker detection, defense, security, government, firewall, cyber attacks, cyber threats, intrustion detection, intrusion defense
     Tripwire
By: Tripwire     Published Date: Feb 08, 2013
It’s no small feat to balance access to data to meet business goals with protecting that very same data from hackers.
Tags : high availability, cloud, security, hacker detection, intrusion prevention
     Tripwire
By: Debix     Published Date: Jun 30, 2008
Fraud preventative solutions are designed to avert new accounts fraud before it occurs. The strategic advantage of fraud prevention therefore lies in the ability avoid losses to institutions and consumers.
Tags : database security, pci, pci-dss, compliance, pci compliance, data protection, identity theft, hacker detection, hack, hacking, debix
     Debix
By: GFI Software     Published Date: Feb 24, 2012
Regardless of whether your organization uses Windows-based PCs or Macs or a mix of both, you need a solution that provides protection for all operating systems. Read to learn more.
Tags : gfi software, hacker detection, security, technology, data protection, intrusion detection
     GFI Software
By: McAfee Inc     Published Date: Aug 19, 2009
Most midsized businesses aren't fully aware of the number of vulnerabilities that exist on their networks. Is it possible to address them all? This brief explains the key benefits of implementing a network security solution with McAfee. Read more.
Tags : mcafee, email protection, midsize, hackers, security, data protection
     McAfee Inc
By: AirDefense     Published Date: Apr 24, 2007
This document outlines how hackers are exploiting vulnerabilities in 802.11 wireless LANs and describes the widely available hacking tools. As a collection of already published risks to wireless LANs, this white paper is written to inform IT security managers of what they are up against.
Tags : hackers, hacker, hacker detection, intrusion prevention, wireless security, wlan, wlans, 802.11, wireless lan, monitoring, airdefense
     AirDefense
By: AirTight Networks     Published Date: Nov 30, 1999
Making corporate data accessible through Wi-Fi networks means intruders and other unwanted visitors can easily access such networks if proper precautions and tools aren't used to protect them. This paper will discuss best practices in all five areas to secure the enterprise network, whether wired or wireless.
Tags : wireless, best practices, enterprise security, wi-fi, wireless security, network security, intrusion prevention, lan, local area network, local area networking, hacker detection, airtight, airtight networks
     AirTight Networks
By: netVigilance     Published Date: Aug 21, 2009
This white paper explains the evolving needs for vulnerability assessment, the special requirements inherent within large enterprises, and how SecureScout SP from netVigilance meets those needs.
Tags : vulnerability management, ips, intrusion prevention, security management, hackers, hacker, hacker detection, network security, net vigilance, netvigilance, security
     netVigilance
By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : network security, intrusion prevention, hackers, hacker detection, ips, anr, nitro security, nitrosecurity
     NitroSecurity
By: PassGo     Published Date: Oct 23, 2007
Looking at IT security history, the bad guys were always far more sophisticated than the people who tried to stop them. Even if companies or the government could conceive of IT security it was almost impossible to achieve it because of the lack of knowledgeable security professionals out there and the lack of security protection tools in the marketplace.
Tags : risk assessment, hacker, hackers, hacker detection, cyber crime, cybercrime, cybercrimes, intrusion, intrusion prevention, intrusion detection, network security, azoogle, azoogle ads
     PassGo
By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : security, anti spyware, malware prevention, malware, access control, hacker detection, internet security, security management, web service security, secure computing, securecomputing
     Secure Computing
By: Secure Computing     Published Date: Feb 22, 2007
This paper outlines these new threats and discusses the limited effectiveness of reactive legacy Web security solutions against those threats.  The paper then outlines the new reputation based, proactive security paradigm that is necessary for securing Web 2.0 applications.
Tags : web 2.0, web 20, web security, application security, web app security, internet security, network security, hacker detection, intrusion prevention, secure computing, securecomputing, security
     Secure Computing
By: Third Brigade     Published Date: Aug 21, 2009
Businesses today are under intense pressure to open up their networks, comply with increasingly rigorous regulatory requirements, AND ensure their IT assets are protected from attacks. This white paper explores these security challenges and explains how host-based Intrusion Prevention Systems  play a critical role in an organization's overall security strategy.
Tags : intrusion prevention, security, network security, compliance, security compliance, attacks, hacker detection, ips, intrusion prevention system, security strategy, security management, third brigade
     Third Brigade
By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : hipaa, hipaa compliance, network security, network security appliance, security management, intrusion prevention, intrusion detection, hacker detection, ips, host-based ips, third brigade, security
     Third Brigade
By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade, security
     Third Brigade
By: Third Brigade     Published Date: Nov 27, 2006
This white paper identifies critical vulnerabilities that most organizations overlook when they secure their web applications. It also introduces host intrusion defense with deep packet inspection as a new, effective  approach for shielding these vulnerabilities.
Tags : web application security, application security, web security, web service security, security management, internet security, ips, intrusion prevention, intrusion detection, hacker detection, third brigade, security, it management, platforms
     Third Brigade
By: TopLayer     Published Date: Aug 21, 2009
This white paper written by Reymann Group, compliance consultant firm, showcases thought leadership on how intrusion prevention solutions can enable proactive security responses necessary to protect today's corporate enterprise and its customers from real time threats posed by widespread cyber terrorists, hackers, and rogue insiders.
Tags : sarbanes, intrusion prevention, ips, sox, sarbanes-oxley, sarbox, network security, cybercrime, hacker, intrustion detection, toplayer, compliance, top layer
     TopLayer
By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention, access control, high availability, symantec
     Symantec
By: Cenzic     Published Date: Nov 30, 2006
With web applications constantly evolving, finding vulnerabilities is a challenging, costly and time-consuming undertaking.  Find out how Cenzic's powerful security solutions help information security teams quickly identify problems, regularly assess web application security strength and ensure regulatory compliance.
Tags : application security, vulnerabilities, vulnerability management, security complinace, compliance, regulatory compliance, it spending, hacker detection, cenzic, security
     Cenzic
By: Cenzic     Published Date: Nov 21, 2006
Enterprises are responding to new threat on communication protocols by hardening Web applications, and they are increasingly turning to Web application security assessment tools to improve the security of their applications. This report examines why high accuracy is critical to the effectiveness of the tools, and it discusses how Cenzic Hailstorm addresses this problem.
Tags : application security, web application security, hacker detection, cenzic, cenzic hailstorm, security
     Cenzic
By: GFI     Published Date: Jun 14, 2007
This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox.
Tags : hacker detection, hackers, ips, ids, intrusion detection, intrusion prevention, internet security, events manager, events management, security monitoring, gfi
     GFI
Previous   1 2    Next    
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com