IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter SecurityWhite Papers (View All Report Types)
 
Four Ways DNS Can Accelerate Business Growth
sponsored by Neustar┬«
WHITE PAPER: This exclusive paper discusses the plethora of benefits that a robust and secure DNS can provide your organization. Read on to find out how you can significantly enhance your web experience for users, driving new streams of revenue.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800
sponsored by IBM
WHITE PAPER: This resource reveals the best-value features to look when making a network intrusion prevention system (IPS) by providing performance analysis of a top IPS solution.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

IBM

Cisco BYOD Smart Solution: Take a Comprehensive Approach to Secure Mobility
sponsored by Cisco
WHITE PAPER: This white paper features a flexible, modular approach to mobile strategies that ensures optimum user access and experience, while offering robust security.
Posted: 21 Mar 2014 | Published: 31 Jul 2013

Cisco

Cybersecurity Imperitives: Reinvent Your Network Security With Palo Alto Networks
sponsored by Palo Alto Networks
WHITE PAPER: This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
Posted: 14 Mar 2014 | Published: 14 Mar 2014

Palo Alto Networks

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This resource highlights results of a 4-question survey about network security, and what IT managers are looking for in a solution to address their top problems.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

Hewlett-Packard Company

Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
sponsored by IBM
WHITE PAPER: This white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
Posted: 05 Mar 2014 | Published: 31 Jan 2014

IBM

Assessing the Value of Next-Generation Firewalls (Gov)
sponsored by Dell Software
WHITE PAPER: This white paper describes the different types of network-based attacks and how they can affect your bottom line. Click through for recommendations on which security tools can help you prevent these threats.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Dell Software

Measure Risks and Vulnerability Effectively
sponsored by Hewlett-Packard Limited
WHITE PAPER: This guide explores strategies for measuring your risks and vulnerabilities, as well as understanding what you must do to achieve these goals.
Posted: 16 Apr 2014 | Published: 31 May 2013

Hewlett-Packard Limited

International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT
sponsored by Cisco
WHITE PAPER: This informative whitepaper explores the role of network security in an increasingly mobile workplace and what you can do to enhance employee productivity.
Posted: 01 Apr 2014 | Published: 31 Dec 2013

Cisco

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement