IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Level Threats White Papers (View All Report Types)
 
Secure your Mobile Enterprise
sponsored by Unisys
WHITE PAPER: How can organizations better secure their mobile environment to confidently secure access from employee-owned or third party mobile devices? Access this white paper and discover a new, innovative security approach that can secure the entire data path and conceal endpoints.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Unisys

The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Palo Alto Networks

Email Security Strategies for Mid-Sized Enterprises
sponsored by LogicNow
WHITE PAPER: Discover how to create an email strategy to combat not only traditional spam attacks, but also malware, spear/phishing, denial of service, directory harvest attacks, and more. Learn the potential damage these attacks can create and how to mitigate the risks.
Posted: 24 Aug 2016 | Published: 24 Aug 2016

LogicNow

Bad Bots, Good Bots and Humans: Quantifying the Risk of Bad Bots
sponsored by Distil Networks
WHITE PAPER: Discover not only the detailed nature of bots, both good and bad ones, but also how to mitigate the massive threat bad bots pose to your enterprise's web presence. Learn not only the numbers and loss surrounding bad bot traffic, but also how to maximize your enterprise's ROI in keeping the bots at bay.
Posted: 29 Aug 2016 | Published: 31 Jul 2016

Distil Networks

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Security Framework: A Guide for Business Leaders
sponsored by Palo Alto Networks
WHITE PAPER: Don't satisfy yourself with the status quo. In this guide, access an extensive security framework which will analyze, detect, prevent, and respond to all known and unknown cyber threats. Learn how to formulate a strategy that will rapidly automate protection, extend network visibility, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

5 Considerations for Securing Hybrid Clouds
sponsored by Intel Security
WHITE PAPER: This white paper explores both old and new security best practices and how to apply them to cloud-based infrastructures. Discover how to make security as agile as the cloud itself by incorporating best practices as an integrated element of a DevOps methodology.
Posted: 23 Sep 2016 | Published: 31 May 2016

Intel Security

Assessing and Sharpening your Security Controls
sponsored by eTECH Channel
WHITE PAPER: Learn what a proper security audit should review, how the report should be structured, and how to reduce risk. Also discover how audits need to be carried out, which controls should be focused upon, and more.
Posted: 18 Aug 2016 | Published: 18 Aug 2016

eTECH Channel

To Pay or Not to Pay: Ransom-Based Cyber-Attacks on the Rise
sponsored by Radware
WHITE PAPER: Organizations need to proactively prepare their networks for ransomware attacks. Learn now about three key considerations for tools and strategies designed to mitigate these incidents, how to detect a fake ransom letter, and the consequences of giving into these threats.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

Radware

Data-centric security Battling Malware, Intrusion and Insider Threats with Endpoint Data Protection
sponsored by Code42
WHITE PAPER: Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval. Learn how you can effectively restore unstructured data to a new or newly-imaged device, protect against exfiltration, and more.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement