IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter SecurityWhite Papers (View All Report Types)
 
Busting Myths About Mobility: Why the Dream of Mobility shouldn’t be a Security Nightmare for Highly Regulated Businesses
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This exclusive white paper takes an in-depth look at mobile security and why your business shouldn't have security nightmares. Read on to crack the common myths about mobility, and more.
Posted: 03 Dec 2014 | Published: 03 Dec 2014

Dell, Inc. and Intel®

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

Prevent Security Breaches with Continuous Monitoring
sponsored by Tenable Network Security
WHITE PAPER: This white paper discusses why defensive security products alone can't fully protect your enterprise from the types of security breaches that have made headlines in recent years, and proposes continuous monitoring as a potential solution.
Posted: 12 Nov 2014 | Published: 25 Jul 2014

Tenable Network Security

The ABCs of Mobile Device Management
sponsored by IBM
WHITE PAPER: Securely managing mobile devices, apps and docs can be difficult without the right tools. However, with so many options employees have when a BYOD campaign is set in place, differences in operating systems and hardware create even more trouble.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

IBM

LogRhythm's Security Intelligence Platform
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper describes LogRhythm's Security Intelligence Platform, which combines enterprise-class SIEM, Log Management, File Integrity Monitoring, and Machine Analytics with Host and Network Forensics to provide profound visibility into threats and risks to which organizations are otherwise blind.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Central control. Manage, monitor and secure your network in minutes with ControlNow
sponsored by ControlNow
WHITE PAPER: This exclusive white paper takes an in-depth look at how one bank was able to recover and continue business after a security breach. Read on to learn more.
Posted: 24 Nov 2014 | Published: 24 Nov 2014

ControlNow

Extending Security Intelligence with Big Data
sponsored by IBM
WHITE PAPER: Learn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
Posted: 08 Oct 2014 | Published: 31 Jan 2013

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

The Devices Are Coming! How the "Internet of Things" Will Affect IT
sponsored by Cox Communications, Inc.
WHITE PAPER: This informative report provides insight into what others are (or aren't) doing to prepare for the invasion of internet-connected devices in the workplace, as well as the changes that your enterprise should anticipate in the coming years.
Posted: 16 Jul 2014 | Published: 31 May 2014

Cox Communications, Inc.

Symantec NetBackup 7.6 Benchmark Comparison
sponsored by Symantec Corporation
WHITE PAPER: In this report, we'll present the results of a 3rd party benchmark test that looks into how a few of the most respected solutions out there fared across five very real-world test scenarios to determine who really is the King of Scale. Read the benchmark report to learn more.
Posted: 22 Oct 2014 | Published: 31 Jul 2014

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement