Secure Microsoft 365 with Reveal(x) 360 Network Detection and Response Reveal(x) 360 monitors Microsoft 365 activity for suspicious or risky behavior, and correlates Microsoft 365 detections with ...
A new release of AirDefense’s wireless intrusion prevention and detection software features a major user-interface redesign, big boost in speed, and greatly expanded reporting tool. A new release of ...
Check Point, which has a lot to do with VPNs, is buying Sourcefire, which has almost nothing to do with VPNs, but does make intrusion-detection software based on Snort open source code. This is part ...
Putting in technical safeguards to spot network intruders or detect denial-of-service attacks at e-commerce servers is a prudent idea. But if your staff doesn’t have the time or skills to install and ...
EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. Reveal(x) 360 monitors Microsoft 365 activity for ...
Sourcefire’s open source IDS engine, Snort, has long been the gold standard of signature-based intrusion detection systems. Snort’s commercial sibling, Sourcefire 3D, takes Snort a step further by ...
The announcement comes just two days after Network Associates, based here, unveiled a deal to buy IntruVert Networks, a maker of network-based intrusion-detection appliances, for $100 million in cash.
Cyber security expert: Internet of things is 'scary as hell' Jerry Irvine, member of the National Cybersecurity Partnership, talks about IoT security, the connected home, and why consumers and ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results