IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security Reports
 
Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam

Secure Cellular Connectivity Empowers BlueNRGY's Global Reach
sponsored by Aeris
CASE STUDY: IoT and machine-to-machine (M2M) connectivity enables networks to overcome critical issues like interrupted services, security breaches, and high implementation and maintenance costs. Discover how BluNRGY enabled secure cellular connectivity for IoT in 190 countries and with more than 550 carriers.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Aeris

4 Reasons to Automate Your Network Right Now
sponsored by Juniper Networks, Inc.
WHITE PAPER: To automate or not to automate – for organizations looking to increase their network agility and reliability, is it even a question anymore? Learn about the risks of not automating and uncover a 3-step roadmap to successful, cost-effective network automation.
Posted: 05 Jul 2017 | Published: 31 May 2016

Juniper Networks, Inc.

It Vs. Users? How Law Firms Can Maximize Security While Granting Access To The Web
sponsored by Authentic8, Inc.
WHITE PAPER: Discover how to maximize network and endpoint security while still granting the web access employees need to stay productive, with a particular focus on the role of security in law firms. Learn how to go beyond virtualization to secure web access and use Silo to create secure, cloud-based virtual browsers.
Posted: 28 Jul 2017 | Published: 31 Dec 2016

Authentic8, Inc.

Enable Visibility and Protection in the Cloud-Connected Enterprise
sponsored by Cisco Umbrella
WHITE PAPER: How can you close visibility gaps in the cloud? Explore two cloud security strategies that can provide the visibility to help you block threats earlier, extend threat protection, and more.
Posted: 26 Jul 2017 | Published: 31 Jul 2017

Cisco Umbrella

Composite Authentication: Understand Security Beyond Passwords
sponsored by Crossmatch
TRANSCRIPT: 82% of breaches are caused by lost, easily hacked or stolen passwords, according to the Verizon DBIR. In this transcript, security experts Kevin Beaver and Jeff Carpenter discuss what composite authentication is, how it evolved, and its place in the future of security.
Posted: 25 Jul 2017 | Published: 25 Jul 2017

Crossmatch

Security Delivery Platforms for Dummies
sponsored by Gigamon
EBOOK: Access this for dummies e-book to discover how a security delivery platform can eliminate network blind spots, optimize security tool performance and scalability and resolve conflict between network and security ops.
Posted: 13 Jun 2017 | Published: 30 Dec 2016

Gigamon

Don't Let Smart Devices Outsmart IT
sponsored by Aruba Networks
RESOURCE: Mobility and the Internet of Things are changing both the IT landscape and our approaches to security. This infographic gives you the basics of delivering a security framework built on adaptive trust defense. You will learn about the growing risks and real-world solutions for the new era.
Posted: 05 Jul 2017 | Published: 05 Jul 2017

Aruba Networks

Identify, Connect, and Protect Mobile and IoT at the Edge
sponsored by Aruba Networks
WHITE PAPER: Discover how Aruba Networks is tackling the challenges of identifying, profiling, authenticating, and applying policies to IoT devices on the network. Learn about their blueprint for securing IoT connectivity at the edge and uncover 4 steps to connecting mobile and IoT devices with end-to-end security in place.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Aruba Networks

14 Steps to Protect Your Organization from Ransomware
sponsored by Carbon Black
WHITE PAPER: Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement