Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Security SoftwareWhite Papers (View All Report Types)
51 - 74 of 74 Matches Previous Page  |  Next Page
Unified Threat Management - Market Review: WatchGuard vs. Juniper, Cisco, Fortinet, and SonicWall
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Posted: 18 Aug 2010 | Published: 21 Apr 2010

WatchGuard Technologies, Inc.

ROI of Switched Ethernet Networking Solutions for the Midmarket
sponsored by Hewlett-Packard Company
WHITE PAPER: To determine the return on investment (ROI) associated with implementation of an HP ProCurve network solution, IDC conducted a study of medium-sized to large organizations with an HP ProCurve implementation up and running in their production environment.
Posted: 16 Aug 2010 | Published: 16 Aug 2010

Hewlett-Packard Company

Sentinel Log Manager Review
sponsored by Novell, Inc.
WHITE PAPER: This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities.
Posted: 28 Jul 2010 | Published: 28 Jul 2010

Novell, Inc.

Detect and Survive
sponsored by Guidance Software, Inc.
WHITE PAPER: This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

Guidance Software, Inc.

How Malware Can Sneak Into Your Company Networks and How to Deal With It
sponsored by AVG Technologies USA, Inc.
WHITE PAPER: Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.
Posted: 31 Mar 2010 | Published: 31 Mar 2010

AVG Technologies USA, Inc.

Managed Public Key Infrastructure: Securing Your Business Applications
sponsored by VeriSign EMEA
WHITE PAPER: The VeriSign® Managed PKI service is an outsourced offering that enables enterprises of any size to rapidly and confidently deploy PKI services. It alleviates the burden of planning, building, and maintaining a PKI, while allowing enterprises to maintain internal control over digital-certificate issuance, suspension, and revocation.
Posted: 03 Mar 2010 | Published: 01 Dec 2005

VeriSign EMEA

High-performance protection at the network edge—what, why and how
sponsored by Sophos, Inc.
WHITE PAPER: With more demands being put on lightweight network-edge hardware to provide security and connectivity, combining simplified malware detection with URI filtering can offer excellent proactive protection without overburdening the hardware or the administrator.
Posted: 05 Jan 2010 | Published: 05 Nov 2009

Sophos, Inc.

Security Goes Virtual
sponsored by AT&T Corp
WHITE PAPER: Virtualization offers the opportunity for a more hands off approach to security. It eliminates the need for local hardware, as well as the time required for security administration. It frees users from worrying about arcane technical details, and eliminates the need for constant attention. Read on to learn more about the benefits of virtualization.
Posted: 28 Oct 2009 | Published: 28 Oct 2009

AT&T Corp

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms
sponsored by ESET
WHITE PAPER: This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology.
Posted: 03 Sep 2009 | Published: 06 Feb 2009

ESET

Guide: Patch Authority Ultimate
sponsored by ScriptLogic Corporation
WHITE PAPER: With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
Posted: 27 Aug 2009 | Published: 27 Aug 2009

ScriptLogic Corporation

When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints
sponsored by Sunbelt Software
WHITE PAPER: Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.
Posted: 30 Jul 2009 | Published: 30 Jul 2009

Sunbelt Software

Cisco Security Solutions - A Reference Guide
sponsored by Cisco Systems, Inc.
WHITE PAPER: This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.
Posted: 10 Jun 2009 | Published: 09 Jun 2009

Cisco Systems, Inc.

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data
sponsored by Bit9, Inc.
WHITE PAPER: As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance...
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Bit9, Inc.

The Value of Integrated Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
Posted: 09 Jun 2009 | Published: 07 Nov 2008

Cisco Systems, Inc.

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research

McAfee Tackles the Complexities of Endpoint Security
sponsored by McAfee, Inc.
WHITE PAPER: McAfee's solution provides strong security while lowering operational costs and simplifying compliance management. This paper describes the different components of the solution, the business value of deploying ToPS for Endpoint, and the benefits of purchasing a complete endpoint security solution from a single vendor.
Posted: 23 Apr 2009 | Published: 02 Dec 2008

McAfee, Inc.

Zero Day to Real-Time: How to combat real-time cybercrime with community threat intelligence
sponsored by McAfee, Inc.
WHITE PAPER: Cybercrime's new techniques demand a new weapon. Read this white paper to learn how this real-time network integrates threat disciplines and introduces new detection and response models that will provide effective protection as the malware wars escalate.
Posted: 23 Apr 2009 | Published: 02 Dec 2008

McAfee, Inc.

Is virtualization a black hole in your security? 5 ways to ensure it isn't
sponsored by Sophos, Inc.
WHITE PAPER: This paper describes the hidden threats raised by unauthorized, unsecured desktop virtualization, and gives five effective ways to secure yourself against them.
Posted: 22 Dec 2008 | Published: 01 Nov 2008

Sophos, Inc.

Catbird V-Agent ™ : Real Security for the Virtual World
sponsored by Catbird Networks, Inc.
WHITE PAPER: Although virtualization is now officially mainstream, industry pundits are cautioning against a rush to virtualize without considering the security implications of doing so. What security practices will and won't work in this new world?
Posted: 19 Oct 2007 | Published: 08 Aug 2007

Catbird Networks, Inc.

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.

The Four Key Qualities of Effective Host Intrusion Prevention Solutions: Defining Deep HIP
sponsored by Third Brigade
WHITE PAPER: Not all Host Intrusion Prevention (HIP) solutions are created equal, some provide more comprehensive protection, higher performance, more robust security and a lower total cost of ownership than others.
Posted: 19 May 2005 | Published: 01 Mar 2005

Third Brigade

Penetration Tests
sponsored by Internet Security Systems, Inc.
WHITE PAPER: A penetration test offers an invaluable and compelling way to establish a baseline assessment of security as seen from outside the boundaries the organization's network.
Posted: 06 Apr 2003 | Published: 01 Jan 2001

Internet Security Systems, Inc.
51 - 74 of 74 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement