IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security White Papers (View All Report Types)
On-Premise, Cloud or Hybrid? Strategies for Service Providers to Mitigate DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper, which service providers may find particularly helpful, reviews the current DDoS landscape and examines why firewalls, IPS, and WAFs cannot stop modern DDoS attacks.
Posted: 02 Oct 2015 | Published: 20 May 2015


How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

6 Threats to Holiday Website Shopping (and 2 Self- Inflicted Wounds)
sponsored by Neustar┬«
WHITE PAPER: View this white paper to see the top 6 cybersecurity threats that are magnified during the holiday season from the hacker's point of view.
Posted: 09 Oct 2015 | Published: 30 Sep 2015


Infographic: Redefining Networks for Cloud, Analytics, Mobile, Social and Security
sponsored by IBM
WHITE PAPER: Access this infographic to learn ways you can prepare your network for the rapidly escalating volume, variety and velocity of traffic from multiple devices.
Posted: 06 Nov 2015 | Published: 31 Dec 2014


Critical Capabilities for High-Security Mobility Management
sponsored by Good Technology
WHITE PAPER: Access this report to find critical capabilities for high-security mobile management, helping you in your next mobile security initiative.
Posted: 25 Nov 2015 | Published: 29 Jul 2015

Good Technology

Building Next Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how to build a next-gen IP communications architecture in your organization, delivering enterprise-grade connectivity, security, and control with a software-driven core. Access this paper to learn how to centralize your UC services and policies.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

Oracle Corporation

The Rise of the Mobile Worker in Australia and Asia
sponsored by Dimension Data
WHITE PAPER: In this report, you will glean the global state of the mobile workforce for 2015 in Australia and Asia and discover how to embrace successful end-user computing. Read on to access the emerging mobile trends for 2016 and foster a collaborative mobile environment in your organization.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Dimension Data

Manage and Protect your Business with SaaS-Based Server Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief outlines how to integrate your server and security strategies. Discover how the right combination can bring you enhanced productivity, collaboration, and security.
Posted: 16 Nov 2015 | Published: 29 Nov 2013

Hewlett Packard Enterprise

Maintaining a DDoS Mitigation Plan
sponsored by Akamai
WHITE PAPER: Discover how to prepare for DDoS attacks through clear organized communication in the security chain in this exclusive white paper. Read on to learn the top 9 best practices for developing and maintaining a DDoS mitigation plan
Posted: 20 Nov 2015 | Published: 11 Nov 2015


Protect Against Threat Propagation and Damage in the Internal Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines how to add an additional security layer to your network with an internal segmentation firewall. Learn how to segment the access of potential threats vectors to critical resources, and limit potential breach damage in your internal network.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

Fortinet, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement