IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security Reports
 
Study on the Cyber Resilient Organization: United Arab Emirates
sponsored by IBM Resilient
WHITE PAPER: Take an in-depth look at this Ponemon study to reveal factors effecting cyber resilience. Learn more about activities to improve it, barriers, and threats.
Posted: 12 Sep 2017 | Published: 30 Jun 2017

IBM Resilient

Research Report: IoT DDoS Attacks Show the Stakes Have Changed
sponsored by Arbor Networks
WHITE PAPER: How can IT network pros defend against DDoS attacks on IoT devices? In this white paper, uncover the recommendations on how to design your DNS infrastructure for stronger security against botnets. Then find out how Forrester Research believes the business technology ecosystem is changing.
Posted: 19 Oct 2017 | Published: 19 Oct 2017

Arbor Networks

National Portrait Gallery Achieves Digital Transformation with DataCore and Lenovo's Hyper-converged Virtual SAN
sponsored by DataCore and Lenovo
CASE STUDY: In this case study, learn how a gallery implemented a Hyper-converged Virtual SAN to expand their digital platform across social media and their website while increasing their overall storage and speed.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

DataCore and Lenovo

Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
sponsored by IBM
EGUIDE: Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

What's on Your Network?
sponsored by Aruba Networks
RESOURCE: In this resource, find out how the closed-loop approach to network security allows IT professionals to deploy and retain control of IoT and BYOD devices to protect against security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Aruba Networks

Digital Documents, Compliance, and the Cloud
sponsored by J2 Cloud Services
WHITE PAPER: This white paper highlights the challenges associated with managing sensitive e-documents that possibly contain intellectual property. Learn best practices for tracking, reporting, and sharing e-documents in the cloud.
Posted: 18 Sep 2017 | Published: 18 Sep 2017

J2 Cloud Services

When it Comes to Optimizing Mid-Market Enterprise Networks, One Size Does Not Fit All
sponsored by Windstream Communications
RESOURCE: This resource stresses the key considerations to make when you are choosing a SD-WAN provider for your enterprise network.
Posted: 25 Sep 2017 | Published: 25 Aug 2017

Windstream Communications

Evolve your Website Security
sponsored by Symantec
WHITE PAPER: In this white paper, learn about Symantec Complete Website Security. See how it helps protect against network breaches by performing weekly vulnerability assessments and daily malware scanning of web pages and web-based applications.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Symantec

How A Regional Bank Maintained Information Security with the Cloud
sponsored by J2 Cloud Services
CASE STUDY: In this case study, learn how a regional bank established the cloud faxing model that features redundancy and survivability to help prevent security breaches.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

J2 Cloud Services

AWS Best Practices for DDoS Resiliency
sponsored by Amazon Web Services
WHITE PAPER: Do not let your website or application become unavailable to end users - protect against DDoS attacks once and for all. Explore this white paper and learn how to improve resiliency of your applications against DDoS attacks with these best practices.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement