IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security White Papers (View All Report Types)
 
Infographic: Health IT Networking Insights, Trends
sponsored by Avaya TSG
WHITE PAPER: How do new and emerging networking technologies affect health IT specifically? Access this infographic to learn how telemedicine, mobile, cloud computing, virtualization, and more, are being used in a healthcare setting to benefit patients, as well as medical professionals.
Posted: 30 Jun 2016 | Published: 31 May 2016

Avaya TSG

Building a Security Fabric for Today's Networks
sponsored by Fortinet, Inc.
WHITE PAPER: Leverage firewalls to build an enterprise network security system that focuses on deploying defensive strategies through the entire enterprise, not just around the perimeter.
Posted: 20 May 2016 | Published: 20 May 2016

Fortinet, Inc.

Advanced Endpoint Protection for Windows Server 2003 After End-of-Support
sponsored by Palo Alto Networks
WHITE PAPER: Identify how you can maintain security in your network, despite the fact that Windows Server 2003 has reached its End-of-Support.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Palo Alto Networks

Mobile Content Management: Top 10 Considerations
sponsored by vmware airwatch
WHITE PAPER: The mobile office is a reality in today's world, meaning a burgeoning number of employees are accessing corporate documents and data on their mobile devices. To protect your business you need enterprise-grade mobile content management. Access this white paper to learn the top 10 considerations for mobile content management.
Posted: 15 Aug 2016 | Published: 01 Jun 2016

vmware airwatch

Top 10 Cyber Incident Pain Points: Are You Prepared?
sponsored by Delta Risk
WHITE PAPER: Discover the 10 most prevalent factors that lead to a network being especially prone to cyber incidents. Interestingly, these characteristics are common across industries.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Delta Risk

Penetration Testing: Protect Customer Data and Your Business From a Breach
sponsored by eTECH Channel
WHITE PAPER: Learn the importance of penetration testing for the payment card industry and why it's become an annual necessity for PCI enterprises. Discover PCI test results including an executive summary describing major findings and remediation info, severity score assignments, and more.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

eTECH Channel

Impact Assessment of a Gigamon Partnership
sponsored by Gigamon
WHITE PAPER: This Forrester Report examines the ROI enterprises may realize from deploying Gigamon for network security needs. It provides readers with clear cut choices to evaluate the possible financial impact of Gigamon on their organization.
Posted: 07 Jun 2016 | Published: 01 May 2016

Gigamon

Ten rules for Bring Your Own Device (BYOD)
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement