IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security Network White Papers (View All Report Types)
 
Why Now Is the Time to Re-Architect the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

IDC Technology Spotlight: Modern "Embedded" Endpoint Security
sponsored by Absolute
WHITE PAPER: This IDC Technology Spotlight explains why modern endpoint security strategies need an innovative approach that maintains always-on IT connectivity to corporate laptops and mobile devices. Learn how to maintain vigilance and identify threats at the earliest stages before a breach can occur.
Posted: 14 Dec 2016 | Published: 30 Nov 2016

Absolute

Info-Tech Research Group SIEM Vendor Landscape Report
sponsored by LogRhythm, Inc.
WHITE PAPER: In this Info-Tech research report, discover the effectiveness and simplicity SIEM can bring to threat management for your organization. Uncover pros and cons of leading SIEM products, insights on where the SIEM market is going, and more.
Posted: 22 Aug 2016 | Published: 01 Jul 2016

LogRhythm, Inc.

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Five Essential Elements for an Effective Mobile Security Strategy
sponsored by vmware airwatch
WHITE PAPER: End users want access to data anytime, anywhere, but enterprise mobility creates increased opportunities for cyberattacks. In this trend brief, you'll review the essential elements of building a mobile security strategy. Access now to learn about ways to construct your strategy and protect data.
Posted: 15 Aug 2016 | Published: 29 Apr 2016

vmware airwatch

Best Practices for Implementing Global IoT Initiatives
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how to successfully launch, secure and maintain your IoT service. Discover six best practices for managing IoT complexity and six crucial areas you must be prepared to address.
Posted: 23 Dec 2016 | Published: 31 Mar 2016

Cisco Systems, Inc.

UEM is the Next Step in the Evolution of Device Management
sponsored by vmware airwatch
WHITE PAPER: Read this white paper to uncover AirWatch's leading unified endpoint management (UEM) approach. Find out how it enables organizations to take a consistent approach to endpoint security and management across a plethora of devices, apps, and deployments.
Posted: 16 Dec 2016 | Published: 16 Dec 2016

vmware airwatch

The Anatomy of Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: When the same network is used by your shoppers and retail associates alike, it's critical that your network security is capable of detecting advanced threats to protect business assets. Discover how to segment devices and access layers across wired and wireless networks to ensure your network is secured from all access points.
Posted: 23 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

High Availability DNS Reduces Downtime Risk and Improves End-User Experience
sponsored by Dyn
WHITE PAPER: This white paper reviews the business advantages of implementing a high availability DNS architecture. You'll learn the critical role DNS plays in the user experience, the risks of relying on a single DNS solution, and the added performance benefits of a high availability DNS architecture.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Dyn
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement