IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security White Papers (View All Report Types)
 
Addressing PCI Compliance Through Privileged Access Management
sponsored by CA Technologies
WHITE PAPER: Read this white paper to learn how to leverage several privileged access management strategies to meet the latest requirements of Payment Card Industry Data Security Standard version 3. Access now to discover how to interrupt the kill chain and eliminate hard-coded passwords.
Posted: 11 Apr 2016 | Published: 31 Dec 2015

CA Technologies

The Human Factor Research Report 2016
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper takes an in-depth look at today's socially engineered attacks, like phishing scams, to help you take action against the wide range of threats. Access now to learn how you can deploy automated incident response capabilities to quickly identify infections.
Posted: 26 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Forrester Report -Building_An_Effective_Breach_Detection_And_Response_Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper shows you the benefits of implementing sandbox solutions to meet your security demands. Modern sandboxed are able to virtually replicate operating environments, execute suspicious code and observe behavior. Access now to best quell sophisticated attackers and prevent future ones.
Posted: 28 Apr 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Norwich School - Case Study
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: This white paper describes the network security challenges that Norwich School faced and how they found a solution that met their every need. Access now to learn how you can have increased visibility and save time by easily identifying potential threats before they become a major problem.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

The Secure Mobile Enterprise: Enabling Mobility while Controlling Risk
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Building a secure mobile enterprise requires a broad, scalable and integrated approach that manages and secures every aspect of mobility usage. To learn more about four essential components of such an enterprise and how to bring them to yours, access this white paper.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and IntelĀ®

Executive_Summary_DefendAgainstTheUndetected
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, you'll discover why you network must have a comprehensive internal and external solution designed to protect your perimeter, your core, your endpoint and everything else in-between. Access now to learn how you can more effectively detect, prevent and remediate harmful actors.
Posted: 29 Apr 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Internal Segmentation Firewall Deployment Guide
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper presents both a design approach as well as a reference architecture for implementing an firewall strategy for your enterprise.
Posted: 02 May 2016 | Published: 31 Dec 2015

Fortinet, Inc.

7 Trends Impacting Enterprise Campus Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Reliance upon cloud applications for mission-critical business functions has heightened network requirements at the edge. Discover in this exclusive white paper how leverage a cloud-enabled enterprise campus network to seamlessly glue your network edge to the cloud and optimize your cloud applications.
Posted: 06 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Architecting for Security Resilience
sponsored by Ixia
WHITE PAPER: As a network architect, you understand that resilience starts at the foundation. Review the several strategies to create an inline security architecture and find out which is best for your organization.
Posted: 22 Mar 2016 | Published: 25 Nov 2015

Ixia
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement