Real-time adaptive security

Results: 7



#Item
1System software / Companies listed on the New York Stock Exchange / Computer security / Computer network security / Host Based Security System / McAfee / Antivirus software / Software

Data Sheet McAfee Threat Intelligence Exchange Delivering adaptive threat prevention in real time

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 16:44:45
2System software / Companies listed on the New York Stock Exchange / Computer security / Computer network security / Host Based Security System / McAfee / Antivirus software / Software

Data Sheet McAfee Threat Intelligence Exchange Delivering adaptive threat prevention in real time

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 16:44:45
3Computer security / Computing / McAfee VirusScan / Computer network security / Malware / Threat / Host Based Security System / Operation Aurora / McAfee / Software / Antivirus software

White Paper Advanced Targeted Attacks: It Takes a System Real-time context sharing supports early attack detection and adaptive threat prevention.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-27 01:18:20
4System software / Companies listed on the New York Stock Exchange / Computer security / Computer network security / Host Based Security System / McAfee / Antivirus software / Software

Data Sheet McAfee Threat Intelligence Exchange Delivering adaptive threat prevention in real time

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-12-05 16:44:45
5Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Juniper Networks / Verisign / Internet / Junos / Network security / Prolexic Technologies / Computing / Computer network security / Cyberwarfare

SOLUTION BRIEF ALWAYS-ON DDOS PROTECTION FROM JUNIPER NETWORKS AND VERISIGN Improve Network Availability and Performance through Real-Time Adaptive DDoS Mitigation

Add to Reading List

Source URL: www.verisigninc.com

Language: English - Date: 2014-07-03 10:10:04
6Computer security / Sourcefire / Telecommunications systems / Snort / Operations support system / GSM / Cloud computing / Real-time adaptive security / Check Point / Computer network security / Computing / Software

TECHNOLOGY BRIEF THE ROLE OF IPS IN THE TELECOMMUNICATIONS AND MOBILE SERVICE PROVIDER INDUSTRY

Add to Reading List

Source URL: www.cnis-mag.com

Language: English - Date: 2010-08-29 03:25:38
7Information technology management / Statistics / Intrusion detection system / Anomaly detection / Audit trail / Information technology security audit / Audit / Association rule learning / Vulnerability / Data mining / Security / Auditing

Adaptive Real-time Anomaly Detection Using Inductively Generated Sequential Patterns Stephen C-Y Lu

Add to Reading List

Source URL: www.cs.washington.edu

Language: English - Date: 2007-04-07 00:42:02
UPDATE