IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security White Papers (View All Report Types)
 
Hyper-Connected Enterprise Infrastructure
sponsored by Hewlett-Packard Company
WHITE PAPER: In this white paper, you'll learn about a mobile-first IT infrastructure approach that enables employees to use powerful apps on any device.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Hewlett-Packard Company

Research Report: The Value of an Upgraded Network Solution
sponsored by Extreme Networks
WHITE PAPER: Access this resource to learn how one company was able to upgrade their network to improve customer service and various business processes.
Posted: 27 May 2015 | Published: 27 May 2015

Extreme Networks

How to Create the Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

Think Like a Bad Guy: Understanding Advanced Threats and How to Mitigate Them
sponsored by Hewlett-Packard Company
WHITE PAPER: Increasingly, today's advanced threats circumvent traditional defenses—even sandboxing. This SlashGuide white paper helps you understand advanced threats and how to defend against them.
Posted: 06 May 2015 | Published: 31 Jan 2015

Hewlett-Packard Company

4 Ways To Strengthen Your DNS Security
sponsored by Neustar®
WHITE PAPER: This white paper presents the four steps to strengthening DNS security to block today's constant dynamic attacks.
Posted: 02 Jun 2015 | Published: 27 May 2015

Neustar®

Leveraging Traffic Visibility and IPS for Comprehensive Continuous Monitoring
sponsored by Gigamon
WHITE PAPER: In this white paper, you will discover one powerful solution that can leverage traffic visibility and an intrusion protection system for continuous monitoring of the network.
Posted: 14 Apr 2015 | Published: 26 Dec 2014

Gigamon

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Eight Questions You Must Ask When Considering an SD-WAN
sponsored by Talari Networks
WHITE PAPER: Access this white paper to learn the 6 key benefits of a software-defined WAN that make it exactly what you need for modern business networking, as well as 8 questions to ask before when considering the change.
Posted: 12 Jun 2015 | Published: 12 Jun 2015

Talari Networks

Don’t Let Your DDoS Defense Fall Behind
sponsored by Neustar®
WHITE PAPER: This white paper examines the pros and cons of several different DDoS mitigation approaches. Access now to learn how to evaluate and choose the ideal strategy based on your risk assessment.
Posted: 01 Jul 2015 | Published: 13 May 2015

Neustar®

Enabling the Mobile Workforce in the Wake of Consumerization
sponsored by Calero Software
WHITE PAPER: In this white paper you'll learn how to gain a competitive advantage by outsourcing mobile support to providers that offer world class service desk capabilities and economies of scale for maximizing the value of mobility.
Posted: 04 Jun 2015 | Published: 26 Dec 2014

Calero Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement