IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network SecurityReports
 
How to Ensure Web and App Performance by Addressing the Front End
sponsored by Limelight Networks, Inc.
WHITE PAPER: The following white paper explores what companies need to do to ensure the performance of web and mobile applications. Uncover how front end acceleration can help achieve the desired speed, which technologies make this goal a reality, and how to apply the front end acceleration to 3 key areas.
Posted: 18 Dec 2014 | Published: 18 Dec 2014

Limelight Networks, Inc.

ESG Lab Video Summary
sponsored by Vectra Networks
WHITE PAPER: In this lab report from Enterprise Strategy Group, analysts study how the Vectra X-series platform - an inside-the-network cyber attack detection and reporting platform. Read on to learn more.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Vectra Networks

Advanced Persistent Threat Detection: ESG Lab Spotlight
sponsored by Vectra Networks
WHITE PAPER: This exclusive white paper takes an in-depth look at why modernizing your network security infrastructure can make all of the difference. Read on to learn more.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

Vectra Networks

Mobile App Solutions
sponsored by IBM
WHITE PAPER: In this white paper, discover an infrastructure solution that provides the performance, control and flexibility you need for developing, deploying and maintaining successful applications.
Posted: 13 Oct 2014 | Published: 31 Dec 2013

IBM

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Trends Reshaping Wireless Networking
sponsored by SearchNetworking.com
EBOOK: Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

SearchNetworking.com

Implementing Software-Defined Security with CloudPassage Halo
sponsored by CloudPassage
WHITE PAPER: This paper summarizes the five architectural principles of SDSec and the ways in whichCloudPassage has implemented them by building the Halo SDSec platform for cloud infrastructure. Read on to learn more.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

CloudPassage

How to Protect Your Business From Today's Security Threats
sponsored by Optus Business
WHITE PAPER: This white paper highlights the importance of maintaining robust network security within your enterprise, especially with an evolving threat landscape.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Optus Business

Network Security Redefined
sponsored by Vectra Networks
WHITE PAPER: Access this white paper to learn how a new solution empowers you with insights to stop attacks, even while they're happening. You'll learn how this platform instantly identifies cyberattack and learns typical network traffic patterns and behaviors while remembering and correlating anomalous behaviors seen over hours, days and weeks.
Posted: 09 Dec 2014 | Published: 09 Dec 2014

Vectra Networks

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement