Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Software White Papers (View All Report Types)
1 - 25 of 93 Matches Previous Page  |  Next Page
Competitive Landscape: Carrier-Class Network Firewalls
sponsored by Juniper Networks, Inc.
WHITE PAPER: As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.
Posted: 23 Aug 2016 | Published: 25 Nov 2015

Juniper Networks, Inc.

Deliver Security Virtually Everywhere with SDN and NFV
sponsored by Juniper Networks, Inc.
WHITE PAPER: Security vendors are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.
Posted: 23 Aug 2016 | Published: 15 Jul 2016

Juniper Networks, Inc.

Penetration Testing: Protect Customer Data and Your Business From a Breach
sponsored by eTECH Channel
WHITE PAPER: Learn the importance of penetration testing for the payment card industry and why it's become an annual necessity for PCI enterprises. Discover PCI test results including an executive summary describing major findings and remediation info, severity score assignments, and more.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

eTECH Channel

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.

How CAME Group Protects Endpoints from Targeted Cyber-Attacks
sponsored by Palo Alto Networks
WHITE PAPER: Working with a trusted IT partner, CAME group was able to deploy a security platform in their central data center and protect more than 1,600 endpoint devices. Discover ways you too can enable increased visibility and control of your network.
Posted: 12 Aug 2016 | Published: 12 Aug 2016

Palo Alto Networks

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware
WHITE PAPER: How do you get your software-defined data center (SDDC) to extend its benefits to your network? Access this white paper to learn how network virtualization can empower your SDDC and provide your network with enhanced security, increased productivity and accelerated IT compliance, ultimately resulting in reduced costs.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: The persistent threats and coordinated attacks in today's environment call for a new model of data center security. But how do you implement this new model without incurring huge hardware and firewall costs? Access this white paper to learn how micro-segmentation empowered by a network virtualization platform delivers fine-grained security.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

Network Security Playbook Guide
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Successful enterprises deal with network security threats quickly and efficiently by relying on network security playbooks. Access this white paper that explains how to build your playbook and highlights a security platform that can be crucial to your network security.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this Gartner report for insight on aligning IT's needs with 3 key use cases to choose the best SIEM tool for your organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

QRadar SIEM
sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013

IBM

Enterprise Campus Architectures—Transformed
sponsored by Juniper Networks, Inc.
WHITE PAPER: Discover in this resource the benefits of collapsing your entire enterprise network into a single platform—including guarantees of increased agility and improved user satisfaction. Read now to deploy cloud network architecture that accommodates your unending need for more bandwidth.
Posted: 05 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

2016 Security Predictions: Understanding the Most Serious Threats and How to Protect Against Them
sponsored by A10 Networks
WHITE PAPER: This security predictions guide highlights 5 emerging threats of 2016. Armed with tactics to stay steps ahead of cybercriminals, you'll feel good about leading your team through the trenches as you mitigate IoT, mobile, and cloud risks.
Posted: 15 Feb 2016 | Published: 15 Feb 2016

A10 Networks

Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks

24 Experts Share Their Network Security Secrets
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, 24 experts reveal their network security secrets. Uncover recommendations on the 5 major security areas that require more attention now than ever.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Advanced Threat Protection Checklist
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to assess your current and proposed security posture against a baseline set of requirements to ensure you pick the right security option for your organization. Uncover 3 overarching recommendations for security.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

Fortinet, Inc.

Validating DDoS Threat Protection
sponsored by A10 Networks
WHITE PAPER: Access this white paper, which contains strategies for protecting the network against the devastating effects of distributed denial of service (DDoS) attacks.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

A10 Networks

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.
1 - 25 of 93 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement