Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Software White Papers (View All Report Types)
1 - 25 of 97 Matches Previous Page  |  Next Page
Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

A Comprehensive, Innovative Approach to Mobile Security
sponsored by Unisys
WHITE PAPER: Because of new mobile threat vectors, security at the device-level is no longer enough. Discover how to strengthen your mobile endpoints from the inside-out with software-defined security, securing mobile data along the entire path to the destination server.
Posted: 20 Jun 2016 | Published: 30 Sep 2015

Unisys

Laptop Management for Windows
sponsored by IBM
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM

QRadar SIEM
sponsored by IBM
WHITE PAPER: This informative resource discusses a security tool that can serve as an the anchor within your security operations, collecting, normalizing, and correlating available network data using years' worth of contextual insights.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

Isolate and Protect your Mission Critical Systems after Support Ends
sponsored by Unisys
WHITE PAPER: When it comes to security concerns for a tool's end-of-life, companies are left with the flight or fight response. Learn what you can do to stay defensive after support expires for Windows products, and ways to reduce the attack surface for the entire enterprise.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Unisys

Market Guide for Network Access Control
sponsored by Aruba Networks
WHITE PAPER: NAC solutions enable organizations to implement policies for controlling device and user access to corporate networks. Explore this research to understand how analysts recommend evaluating and selecting NAC solutions that meet your needs.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Aruba Networks

Empowering Mobile Security with Policy Management
sponsored by Aruba Networks
WHITE PAPER: Policy management is the key to enforcing mobile security. Discover cost-effective, easier ways to manage the tedious and complex rule sets associated with legacy authentication, authorization and accounting.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Cyber Risk Report 2016 Executive Summary
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this year's cyber risk report, you will discover the evolving nature of cybercrime, as well as the developing legislation meant to curtail it. Read on to delve into what defenders now face as they look to secure their enterprises.
Posted: 10 Jun 2016 | Published: 19 Feb 2016

Hewlett Packard Enterprise

Secure the Network On-Premise, Site-to-Site, and in the Cloud
sponsored by Unisys
WHITE PAPER: Whether on-promise or remote, devices that find their way into your organization's communication paths should be cautiously welcomed at best. Explore micro-segmentation and endpoint protection strategies for cloud-based businesses.
Posted: 05 Jun 2016 | Published: 05 Jun 2016

Unisys

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell Software
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Anatomy of a Cyber-Attack
sponsored by Dell Software
WHITE PAPER: You need to understand the enemy -- and their malware -- before you can defeat them. Discover a comprehensive strategy to counter every stage of cyber-attacks and eliminate every type of malware from disrupting your network.
Posted: 20 May 2016 | Published: 20 May 2016

Dell Software

Reaping the Benefits of Strong, Smarter User Authentication
sponsored by Symantec Corporation
WHITE PAPER: Discover how the changes in enterprise IT—namely mobility and cloud—affect smart authentication implementation. Access now to learn how you can remain secure against today's evolving security threats with smarter user authentication.
Posted: 13 May 2016 | Published: 31 Dec 2015

Symantec Corporation

Enterprise Campus Architectures—Transformed
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this resource the benefits of collapsing your entire enterprise network into a single platform—including guarantees of increased agility and improved user satisfaction. Read now to deploy cloud network architecture that accommodates your unending need for more bandwidth.
Posted: 05 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Next-Generation Datacenter Security Implementation Guidelines
sponsored by Palo Alto Networks
WHITE PAPER: This resource discusses reveals the three critical components of a datacenter security implementation.
Posted: 14 Apr 2016 | Published: 30 Nov 2015

Palo Alto Networks

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Attack Resiliency Challenges Industry Collaboration Ability
sponsored by OpenDNS
WHITE PAPER: Attackers are reaping millions in profit, and defenders are struggling to detect and combat cybersecurity threats. This infographic lays out the ways that next-generation attacks on the network are challenging today's security teams.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

OpenDNS

Network Security Models: How to Discover Attacks Before They Happen
sponsored by OpenDNS
WHITE PAPER: This infographic explores network security models, and how data scientists are able to use these models to discover malicious attacks before they happen.
Posted: 14 Mar 2016 | Published: 31 Dec 2015

OpenDNS

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

24 Experts Share Their Network Security Secrets
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, 24 experts reveal their network security secrets. Uncover recommendations on the 5 major security areas that require more attention now than ever.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Advanced Threat Protection Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to assess your current and proposed security posture against a baseline set of requirements to ensure you pick the right security option for your organization. Uncover 3 overarching recommendations for security.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Fortinet, Inc.

Is Your Network Security Limited to Defending Yesterday's Threats?
sponsored by IBM
WHITE PAPER: In this infographic, you will discover how to safeguard your organization from new and emerging threats with a next-gen IPS. Read on how to move beyond pattern matching and apply behavior-based protection to combat advanced and unknown threats to defend your organization.
Posted: 25 Jan 2016 | Published: 03 Nov 2015

IBM

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks

Validating DDoS Threat Protection
sponsored by A10 Networks
WHITE PAPER: Access this white paper, which contains strategies for protecting the network against the devastating effects of distributed denial of service (DDoS) attacks.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

A10 Networks
1 - 25 of 97 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement