IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security White Papers (View All Report Types)
 
Digital Advisory Services: Map out Your Software Defined Networking Journey
sponsored by Verizon
WHITE PAPER: With SD-WAN and virtualization, you can quickly scale your environment, centralize management, maintain security, and control costs better – but it can be hard to get started. Learn about a SD-WAN Awareness Workshop that's designed to help deepen your understanding of SD-WAN, its challenges, use cases, and beyond.
Posted: 17 Aug 2017 | Published: 31 Dec 2016

Verizon

Policy Management for IoT, Mobile, and Network Security
sponsored by Aruba Networks
WHITE PAPER: With mobility and IoT redefining today's security perimeter, this white paper explores how to expand the view of your network beyond the walls of your office. Find out what devices and how many are accessing your network with a centralized policy management platform.
Posted: 12 May 2017 | Published: 12 May 2017

Aruba Networks

How to Scale for IoT Connectivity
sponsored by Aeris
WHITE PAPER: Discover how to create a M2M and IoT connectivity strategy that suits not only the needs of today but scales for the demands of tomorrow. Read on to learn about 3 traits to look for in an IoT partner and 3 IoT connectivity case studies.
Posted: 11 Aug 2017 | Published: 11 Aug 2017

Aeris

A Proactive Approach to Network Operations Management and Cost Reduction
sponsored by Indeni
WHITE PAPER: Explore how to create a real-time window into network health and stability, and reduce the amount of time spent on troubleshooting the seemingly never-ending stream of network issues. Learn how to navigate the myths of using automation in network monitoring and security.
Posted: 06 Jun 2017 | Published: 06 Jun 2017


The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

Overview of the Secure Development Lifecycle
sponsored by APC by Schneider Electric
WHITE PAPER: Secure development lifecycle (SDL) is a process that keeps security in mind with every step of the app development process. Uncover an overview of SDL and 8 key practices that will enable your organization to design and build software securely.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

APC by Schneider Electric

The 2017 State of the Firewall
sponsored by FireMon
WHITE PAPER: Access FireMon's 3rd Annual State of the Firewall Report to learn how your peers feel about firewall infrastructure and management challenges, as well as the adoption and impact of emerging tech such as SDN, cloud, and IoT.
Posted: 24 Jul 2017 | Published: 31 Jan 2017

FireMon

What's Driving WAN Architecture Simplification?
sponsored by Silver Peak
WHITE PAPER: Learn more about what challenges are driving WAN architecture simplification and how you can take advantage of it in this white paper.
Posted: 01 May 2017 | Published: 30 Dec 2016

Silver Peak

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

What Changing Mobile Communications Mean for Your Business
sponsored by Mitel Networks Limited
WHITE PAPER: In this TechTarget white paper, learn how to prepare your business for mobile communications with a mobile-centric strategy that encompasses collaboration, customer experience and future technology like IoT and machine-to-machine communications.
Posted: 10 Apr 2017 | Published: 30 Dec 2016

Mitel Networks Limited
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement