IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security Network White Papers (View All Report Types)
Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016


Create Access Controls and Visibility for Any Wired or Wireless Network
sponsored by Aruba Networks
WHITE PAPER: Learn about an adaptive security approach that can provide access controls and visibility for any wired and wireless network, and allow you to set policies based on contextual data, streamline the onboarding of mobile devices, and more.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

Aruba Networks

When Firewalls Aren't Enough: Introducing Virtualization and Micro-Segmentation to your Security Strategy
sponsored by VMware
WHITE PAPER: Micro-segmentation is built upon a next-generation networking model better known as network virtualization. Learn how to enable fine-grained policies and network controls when you virtualize the network, scale firewall capabilities, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016


Rethinking Network Architecture
sponsored by Juniper Networks, Inc.
WHITE PAPER: To meet the demands of application environments prevalent in today's data centers, IT leaders need to rethink their approach to network architecture. Access this white paper that explains the need for a new approach to network architectures and how you can enable a simple, open and smart data center.
Posted: 07 Sep 2016 | Published: 31 Jul 2015

Juniper Networks, Inc.

Reducing Cyber Risk in the Legal Sector: The Blurred Boundaries of Trust
sponsored by LogRhythm, Inc.
WHITE PAPER: Download this white paper to shore up your legal firm's cybersecurity defenses by adopting security intelligence tools, as well as examine the top five use-cases for centralized monitoring within the legal sector. Learn how to reduce risk through faster detection and response by identifying key areas of vulnerability.
Posted: 22 Jul 2016 | Published: 22 Jul 2016

LogRhythm, Inc.

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Today, almost every distributed enterprise demands fast, transparent access to critical information. And as the data travels fast, so too must protection around it. Discover a tightly integrated infrastructure – access, networking and security - capable of meeting these demands without compromising performance or security.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

Fortinet, Inc.

An Enterprise Security Program and Architecture to Support Business Drivers
sponsored by Above Security
WHITE PAPER: This white paper presents the case for leveraging enterprise security architectures to meet an organization's need for information assurance. It'll help you understand information assurance and show you how to align security initiatives with business goals to deliver an effective security program.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

Above Security

Improve Remote Monitoring and Management
sponsored by Autotask Corporation
WHITE PAPER: Discover 5 business advantages that can be obtained when addressing a solution towards remote monitoring and management (RMM) including policy-based management and support, superior cloud-based services, and more.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Autotask Corporation

Traditional Security Solutions Aren't Enough: Add Micro-Segmentation to your Virtual Network
sponsored by VMware
WHITE PAPER: In a recent survey, 60% of respondents said they had adopted network virtualization to help address concerns with data security. Learn how building micro-segmentation on your virtualized network can help you verify and secure all resources, limit and strictly enforce access control, and more.
Posted: 27 Oct 2016 | Published: 27 Oct 2016


Maximize Your VPN to Enhance Cloud Connectivity
sponsored by AT&T
WHITE PAPER: This white paper evaluates the impact of cloud on various enterprise applications; which is, in turn, driving the demand for secure private network connectivity to cloud. Also explained are the business benefits of deploying an integrated MPLS VPN and cloud solution.
Posted: 01 Jul 2016 | Published: 31 Mar 2016

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement