Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Software White Papers (View All Report Types)
1 - 25 of 110 Matches Previous Page  |  Next Page
Analyzing the Top 8 Indicators of Threat Traffic
sponsored by LogRhythm, Inc.
WHITE PAPER: While endpoint security tools assist with the detection of a compromised endpoint, the analysis of anomalous network traffic is critical to detecting ongoing compromised systems. Read on for details on the top 8 indicators of compromise in network traffic.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

LogRhythm, Inc.

The Top Cybersecurity Risks – And How Enterprises Are Responding
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers.
Posted: 23 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Mitigate Data Theft and Inappropriate Use in your Network
sponsored by LogRhythm, Inc.
WHITE PAPER: Security teams need tools to help deliver the deep insight necessary to detect a variety of threats. Uncover ways to detect and respond to today's security incidents with tools designed to pinpoint abnormal activity and prevent sensitive data loss.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

LogRhythm, Inc.

Office 365: Enabling More Secure Collaboration
sponsored by VMware
WHITE PAPER: How can you ensure secure collaboration with Office 365? Learn 3 steps to make this possible, as well as 3 stages of adoption for security add-ons for Office 365.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

VMware

Top Three Gaping Holes in Your Data Security
sponsored by Globalscape
WHITE PAPER: Regardless of efforts to secure your network from external threats, data breaches usually begin from inside. In this Globalscape paper, you'll learn: the 3 layers most targeted (the network, data & users), bad security practices, why Managed File Transfer is a critical component to combat bad practices, and more.
Posted: 08 Nov 2016 | Published: 08 Nov 2016

Globalscape

Agile Security for Virtualization, Software-DefinedNetworking, and Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how software-defined networking has changed security, and how some of the best policies can flourish when security is kept at the heart of the data center revolution.
Posted: 07 Nov 2016 | Published: 07 Nov 2016

Fortinet, Inc.

Protecting the Hybrid Data Center in an Increasingly Virtualized World
sponsored by Juniper Networks, Inc.
WHITE PAPER: Virtualized server workloads have increased in the past year, however most security measures in place today are for purely physical environments. Uncover how to secure your organization's current or future virtualized environments and prevent harmful security tactics.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Juniper Networks, Inc.

Modernize Your Data Center Security
sponsored by VMware
WHITE PAPER: In a recent survey, 60% of respondents said they had adopted network virtualization to help address concerns with data security. Learn how building micro-segmentation on your virtualized network can help you verify and secure all resources, limit and strictly enforce access control, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

VMware

Why Firewalls Alone Are No Longer Enough
sponsored by VMware
WHITE PAPER: Micro-segmentation is built upon a next-generation networking model better known as network virtualization. Learn how to enable fine-grained policies and network controls when you virtualize the network, scale firewall capabilities, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

VMware

7 Ways to Make Yourself Harder to Hack
sponsored by LogicNow
WHITE PAPER: Whether you call it layered security or defense in depth, layers of control buys you time to respond effectively. Access now to learn more about integrated tools that cover security and network management for MSPs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

LogicNow

Masergy's Unified Enterprise Security Solution
sponsored by MASERGY
WHITE PAPER: This white paper explores how Masergy's Unified Enterprise Security Solution provides an integrated approach to security, combining predictive data sharing with an agile analytics and correlation program. Learn how Masergy can help you build an affordable, multi-layered security infrastructure that causes no additional network latency.
Posted: 18 Oct 2016 | Published: 18 Oct 2016

MASERGY

The Security Fabric of The Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat.
Posted: 22 Sep 2016 | Published: 22 Apr 2016

Fortinet, Inc.

The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Palo Alto Networks

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: The complexity of your network and your security infrastructure may limit or slow your ability to respond to cybersecurity challenges. Discover 10 key considerations for firewall decision-making as you strive to manage the risks associated with the applications traversing your network.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

Palo Alto Networks

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Optimize High-Performing DNS Infrastructures for Greater Security
sponsored by EfficientIP
WHITE PAPER: In this white paper, you will examine three methods of optimizing DNS infrastructure to achieve greater security, performance, simplicity, and a drastic reduction in TCO. Access this resource to uncover 3 case studies that explore how to get rid of server farms, unsuitable intermediary security layers, and how to decentralize DNS architecture.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Why Now Is the Time to Re-Architect the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Top 6 Security Measures for the Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Learn about a next-generation network security model that moves away from disparate security products and security points for a united front against potential attacks. Plus, find details on the top six security measures to safeguard campus networks.
Posted: 02 Sep 2016 | Published: 02 Sep 2016

Juniper Networks, Inc.

ESG Lab Review: Performance and Scalability of Juniper SRX5400
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

Competitive Landscape: Carrier-Class Network Firewalls
sponsored by Juniper Networks, Inc.
WHITE PAPER: As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.
Posted: 23 Aug 2016 | Published: 25 Nov 2015

Juniper Networks, Inc.

Deliver Security Virtually Everywhere with SDN and NFV
sponsored by Juniper Networks, Inc.
WHITE PAPER: Security vendors are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.
Posted: 23 Aug 2016 | Published: 15 Jul 2016

Juniper Networks, Inc.

Penetration Testing: Protect Customer Data and Your Business From a Breach
sponsored by eTECH Channel
WHITE PAPER: Learn the importance of penetration testing for the payment card industry and why it's become an annual necessity for PCI enterprises. Discover PCI test results including an executive summary describing major findings and remediation info, severity score assignments, and more.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

eTECH Channel

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.
1 - 25 of 110 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement