IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security White Papers (View All Report Types)
Deploy and Manage Your School's Wi-Fi Network in a Snap
sponsored by Cisco
WHITE PAPER: In this white paper, you will learn how to deploy and manage your school's Wi-Fi network using a simple, over-the-air configuration interface. Check out the benefits of this wireless mobile management, deliver fast LAN technology, and more.
Posted: 22 Oct 2015 | Published: 22 Oct 2015


The State of the Virtualized Data Center: Physical and Virtual Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Find out how your network security peers evaluate network security when implementing new technology, and what they look for when choosing tools to support a virtualized environment, in this survey report.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Juniper Networks, Inc.

Critical Capabilities for High-Security Mobility Management
sponsored by Good Technology
WHITE PAPER: Access this report to find critical capabilities for high-security mobile management, helping you in your next mobile security initiative.
Posted: 25 Nov 2015 | Published: 29 Jul 2015

Good Technology

The Expanding Role and Importance of Application Delivery Controllers (ADCs)
sponsored by Radware
WHITE PAPER: In this white paper, learn how Application Delivery Controllers (ADCs) have moved beyond load balancing to become a critical network security control.
Posted: 12 Nov 2015 | Published: 02 Feb 2015


Battling Security Threats from Within your Organization
sponsored by IBM
WHITE PAPER: Access this report to discover how employees and other parties you conduct business with can take advantage of your data sources, plus mitigation techniques for threats within the enterprise.
Posted: 30 Nov 2015 | Published: 30 Jun 2015


Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 12 Nov 2015 | Published: 30 Jun 2015

Hewlett Packard Enterprise

Inside the Wire: Why Perimeter-centric Monitoring Leaves You Vulnerable
sponsored by Trend Micro
WHITE PAPER: In this white paper, discover how to gain east-west visibility into your network to uncover hidden advanced threats. Continue reading to learn how to detect malicious activity before it hits your valuable data.
Posted: 02 Oct 2015 | Published: 17 Jun 2015

Trend Micro

How Boston Properties Stays One Step Ahead of Advanced Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this case study to discover how Boston Properties, a real estate company, found a security tool that could catch any cybersecurity threat, even unknown ones.
Posted: 12 Nov 2015 | Published: 12 Nov 2015

Check Point Software Technologies Ltd.

The Rise of the Mobile Worker in Australia and Asia
sponsored by Dimension Data
WHITE PAPER: In this report, you will glean the global state of the mobile workforce for 2015 in Australia and Asia and discover how to embrace successful end-user computing. Read on to access the emerging mobile trends for 2016 and foster a collaborative mobile environment in your organization.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Dimension Data

Privacy and Safety: How SSL Certificates Empower Your Business
sponsored by Symantec Corporation
WHITE PAPER: In this infographic, learn the 6 golden rules for selecting an SSL or TLS certificate as well as tips and best practices for simple implementation and management. Discover how to put your users' minds to rest with the right SSL.
Posted: 11 Nov 2015 | Published: 07 Oct 2015

Symantec Corporation
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement