IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Level Threats White Papers (View All Report Types)
 
Network Security 3 Phase Framework
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for protecting data and defending against concealed threats. View now to learn how this strategy keeps you ahead of the curve to prevent new attacks.
Posted: 06 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 19 May 2015 | Published: 03 Jun 2014

Clearswift

SMS: A New Approach to Two Factor Authentication
sponsored by Nexmo
WHITE PAPER: This white paper explores how to secure enterprise data and sensitive information on mobile devices by using two factor authentication (2FA). View now to learn the 15 best practices to implementing a 2FA strategy and ensuring security success.
Posted: 22 Apr 2015 | Published: 21 Jan 2015

Nexmo

Florida Gulf Coast University Teaches Malware a Lesson
sponsored by Malwarebytes Corporation
WHITE PAPER: In this exclusive case study, discover how a major university kept thousands of users safe from malware.
Posted: 08 May 2015 | Published: 08 May 2015


Protection from the Inside: Application Security Methodologies Compared
sponsored by Hewlett-Packard Company
WHITE PAPER: In this paper, the SANS Institute captures the relative capabilities and efficiencies of RASP and WAF technologies using a representative product in each category. Learn how your defense-in-depth strategy could benefit from the additional visibility of runtime protection.
Posted: 15 May 2015 | Published: 16 Apr 2015

Hewlett-Packard Company

Today's Microsoft Office 365 Security Hurdles
sponsored by Clearswift
WHITE PAPER: This white paper outlines today's 11 Microsoft Office 365 security challenges and how to modify your email security strategy to secure content and data.
Posted: 22 May 2015 | Published: 06 May 2015

Clearswift

Top 7 Phone Verification Challenges
sponsored by Nexmo
WHITE PAPER: This white paper explores the seven challenges of phone verification and how you can overcome each one and improve conversion rates.  View now to learn more.
Posted: 23 Apr 2015 | Published: 27 Feb 2015

Nexmo

Web-App Firewall: Protecting against DoS/DDoS Attacks
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines why traditional firewalls are insufficient to defend against malicious botnet attacks and how to rethink your security strategy.
Posted: 06 May 2015 | Published: 28 Dec 2012

Fortinet, Inc.

Securing Next-Generation Mobile Security
sponsored by EE
WHITE PAPER: This white paper explores enterprise mobility management (EMM) strategies and how to secure mobile users.
Posted: 21 May 2015 | Published: 08 Apr 2015

EE

The Secret Ingredient in Mobile ROI
sponsored by BlackBerry
WHITE PAPER: In this white paper, you'll learn why security doesn't have to be a barrier to your business goals, but rather enable business decision-makers, end users and daily operations.
Posted: 21 Apr 2015 | Published: 21 Apr 2015

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement