IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security White Papers (View All Report Types)
 
Validating DDoS Threat Protection
sponsored by A10 Networks
WHITE PAPER: Access this white paper, which contains strategies for protecting the network against the devastating effects of distributed denial of service (DDoS) attacks.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

A10 Networks

Financials Risk Report: DDoS Attacks Target Financial Organizations
sponsored by SurfWatch Labs
WHITE PAPER: DDoS attacks will happen to you, but they can be mitigated. Read on to discover how you can safeguard your network from cyber threats and other hazards from compromising employee and customer data.
Posted: 13 Jan 2016 | Published: 26 Aug 2015

SurfWatch Labs

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems

Digital Guardian Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: Continue reading this white paper to discover how you can gain the deepest visibility, fine-grained control and the industry's broadest data protection coverage
Posted: 02 Feb 2016 | Published: 31 Dec 2015

Digital Guardian

What Security Professionals Need to Know About Open Source Vulnerabilities
sponsored by Black Duck Software
WHITE PAPER: This white paper shows you how to secure and develop open source software effectively and efficiently.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

Black Duck Software

Network Security Monitoring with Real-Time Visibility to Vulnerabilities and Threats
sponsored by Tenable Network Security
WHITE PAPER: This resource discusses the challenges of static security scanning tools and a way to implement a continuous scanning method that can improve your enterprise's resistance to numerous forms of attack.
Posted: 28 Dec 2015 | Published: 28 Jul 2014

Tenable Network Security

Top 5 Solution Requirements for Account Takeover Protection
sponsored by Imperva
WHITE PAPER: Download this playbook and learn five solution requirements for effective account takeover protection.
Posted: 12 Feb 2016 | Published: 30 Dec 2015

Imperva

6 Keys to Eliminating SSL Blind Spots: What You Need for SSL Inspection
sponsored by A10 Networks
WHITE PAPER: It is estimated that 67 percent of Internet traffic will be encrypted by 2016, but that won't stop hackers from using it to their advantage. Learn six ways to ensure your network can stand up to malicious traffic with SSL inspection technology.
Posted: 20 Jan 2016 | Published: 20 Jan 2016

A10 Networks

Prioritizing IT Monitoring Alerts with Anomaly Severity Scores
sponsored by Prelert
WHITE PAPER: This white paper examines why organizations are turning to behavioral analytics to reduce noise and takes a closer look at one organization's success with the strategy.
Posted: 01 Feb 2016 | Published: 12 Aug 2015

Prelert

10 Features Every Web App Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement