IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security White Papers (View All Report Types)
 
Detect and Investigate DNS Tunneling with Security Analytics
sponsored by Prelert
WHITE PAPER: In this white paper, discover the benefits of enhancing anomaly detection and why it's imperative your network security leverages it.
Posted: 01 Feb 2016 | Published: 24 Aug 2015

Prelert

Network Barometer Report
sponsored by Dimension Data
WHITE PAPER: This report gauges the readiness of today's networks to support business. Read on for recommendations about how to improve network services levels. And how to reduce support time.
Posted: 16 Dec 2015 | Published: 16 Dec 2015

Dimension Data

Cyberthreat Defense Report: Malware Tops the Charts
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, find out how to identify, contain, and remediate unknown threats through real-time analysis. Discover how to close SSL blind spots and secure mobile devices and remote access endpoints inside.
Posted: 03 Feb 2016 | Published: 25 Feb 2015

Blue Coat Systems

Financials Risk Report: DDoS Attacks Target Financial Organizations
sponsored by SurfWatch Labs
WHITE PAPER: DDoS attacks will happen to you, but they can be mitigated. Read on to discover how you can safeguard your network from cyber threats and other hazards from compromising employee and customer data.
Posted: 13 Jan 2016 | Published: 26 Aug 2015

SurfWatch Labs

Threat Intelligence Platforms: Everything You’ve Ever Wanted to Know But Didn’t Know to Ask
sponsored by ThreatConnect
WHITE PAPER: This in-depth resource covers the ins and outs of threat intelligence, discussing everything from what threat intelligence is to how you can best utilize it.
Posted: 15 Dec 2015 | Published: 15 Dec 2015

ThreatConnect

Why Enterprises Need a Comprehensive Solution for Website Security
sponsored by Symantec Website Security
WHITE PAPER: This white paper describes the cybersecurity challenges organizations are up against and how a comprehensive security strategy is the key to mitigating data breaches.
Posted: 09 Feb 2016 | Published: 03 Feb 2016

Symantec Website Security

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Kingpin Communications
WHITE PAPER: Mobile operating systems contain a large number of exploitable vulnerabilities related to access privileges. In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content, and discover how to detect suspicious mobile activity.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

DataGravity and Continuous Sensitive Data Monitoring
sponsored by DataGravity
WHITE PAPER: This white paper discusses tools and technologies that will help in the mitigation, detections and response to risks within your network.
Posted: 11 Feb 2016 | Published: 31 Jul 2015

DataGravity

The Industralization of Hacking: How to Stop Automated Attacks
sponsored by Imperva
WHITE PAPER: View this infographic and learn how you can better defend against such advanced Web-based attacks.
Posted: 11 Feb 2016 | Published: 30 Dec 2015

Imperva

Prioritizing IT Monitoring Alerts with Anomaly Severity Scores
sponsored by Prelert
WHITE PAPER: This white paper examines why organizations are turning to behavioral analytics to reduce noise and takes a closer look at one organization's success with the strategy.
Posted: 01 Feb 2016 | Published: 12 Aug 2015

Prelert
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement