IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security White Papers (View All Report Types)
From GPO to MDM: A New Era of Enterprise Computing
sponsored by MobileIron
WHITE PAPER: This white paper looks to enterprise mobility management (EMM) as the primary means of securing and managing enterprise devices during the evolution of operating systems.
Posted: 05 Aug 2015 | Published: 05 Aug 2015


Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper discusses the challenges of decryption and gives advice on how you can implement it more effectively.
Posted: 17 Sep 2015 | Published: 20 Jan 2015

Blue Coat Systems

Case Study: A SIEM Effective Enough for a Government Contractor
sponsored by Splunk
WHITE PAPER: This white paper describes how a technology integration business found a SEIM solution strong enough to protect the sensitive government information it manages.
Posted: 24 Aug 2015 | Published: 24 Aug 2015


Top Ten Criteria for Evaluating Network Packet Broker Solutions
sponsored by VSS Monitoring
WHITE PAPER: This white paper discusses ten ways that you should evaluate your choice for a network packet broker solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

VSS Monitoring

10 Features Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This paper explains in detail the 10 features that every Web application firewall must provide.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


An Alternative Certificate Validation Strategy
sponsored by HID
WHITE PAPER: This white paper outlines the two classical approaches to certificate validation as well as a third, alternative appraoch. Access this resource now to learn how to build a secure certificate validation infrastructure and improve authentication security.
Posted: 13 Aug 2015 | Published: 10 Oct 2014


Secure Your Data, Satisfy Your Shoppers
sponsored by Earthlink.
WHITE PAPER: In this white paper, you'll uncover how to increase visibility for active monitoring to address security concerns.
Posted: 16 Sep 2015 | Published: 25 Mar 2015


Complexity and Data Growth Driving Environments Toward a New Generation of Data Protection
sponsored by Acronis
WHITE PAPER: Access this research report to discover the key challenges that IT infrastructure professionals are faced with, and learn how backup and DR solutions are evolving as a result.
Posted: 07 Jul 2015 | Published: 30 Jun 2014


Secure Content For the Mobile Enterprise
sponsored by Acronis
WHITE PAPER: Download and discover how Acronis Access Advanced enables simple, secure and managed mobile file access, sync and share.
Posted: 02 Jul 2015 | Published: 31 Jul 2014


Performance Reviews of 7 Next-Gen IPS Tools
sponsored by IBM
WHITE PAPER: This Gartner report looks at leading the next-generation IPS tools, giving detailed reviews on seven of the best.
Posted: 01 Sep 2015 | Published: 29 Dec 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement