IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security White Papers (View All Report Types)
 
Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

The Secure Mobile Enterprise
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: Access this white paper to learn how to build a secure mobile enterprise. Learn the four essential components that provide complete security coverage for mobile workspaces and explore the key steps and solutions that can help to deliver each of these areas.
Posted: 27 Apr 2015 | Published: 27 Apr 2015

Dell, Inc. and IntelĀ®

How to Securely Sync, Share, Collaborate, and Manage Business Content
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper examines one Software as a Service (SaaS) strategy and how it enables mobile content access and secure file sharing outside of the firewall. View now to see how other organizations have used this approach to protect data and files as they are accessed and shared and if it is right for your organization.
Posted: 18 May 2015 | Published: 16 Dec 2014

IntraLinks, Inc

SaaS - Simplifying Network Security and Compliance
sponsored by SilverSky
WHITE PAPER: This white paper examines the benefits of migrating to a SaaS security model.
Posted: 02 Jun 2015 | Published: 13 May 2015

SilverSky

Enterprise Mobility Management Without Investing in a New Solution
sponsored by Pulse Secure
WHITE PAPER: Access this white paper to learn how you can activate the EMM capabilities of your existing virtual private network (VPN) so that you can successfully manage mobile devices without migrating to a new system.
Posted: 11 Jun 2015 | Published: 29 May 2015

Pulse Secure

Developing a Network Infrsatructure to Support Cloud Computing
sponsored by Level 3 Communications, Inc.
WHITE PAPER: This white paper explains how to develop a network infrastructure that supports your cloud computing efforts.
Posted: 06 Apr 2015 | Published: 31 Dec 2014

Level 3 Communications, Inc.

Next-Gen Security Analytics - 7 Necessary Functions
sponsored by Blue Coat Systems
WHITE PAPER: This white paper examines security analytics in depth and the seven functions a security analytics platform needs to have.
Posted: 03 Apr 2015 | Published: 09 Jul 2014

Blue Coat Systems

Integrating MDM and NAC for Mobile Success
sponsored by Pulse Secure
WHITE PAPER: Read this white paper to discover how integrated VPN, access control, and mobile device management solutions deliver superior network security and BYOD productivity so that you can gain a competitive edge in the mobile business world.
Posted: 09 Jun 2015 | Published: 28 Aug 2015

Pulse Secure

An E-Guide to Online Security
sponsored by Melbourne IT
WHITE PAPER: The following white paper examines several ways to develop and implement long-term security strategies to proactively defend against evolving security risks. Access now and learn what it takes to beef up your online security quick and efficiently.
Posted: 05 Jun 2015 | Published: 05 Jun 2015

Melbourne IT

Research Study: Top Network Technology Purchasing Concerns
sponsored by Dell, Inc.
WHITE PAPER: This resource details the key networking technologies that IT executives and professionals sought to upgrade in 2014.
Posted: 29 May 2015 | Published: 30 May 2014

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement