IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network SecurityReports
 
What to look for when evaluating NGFW
sponsored by Dell Software
WHITE PAPER: This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Proven Practices for Securing Your Website Against DDoS Attacks
sponsored by Dyn
WEBCAST: This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.
Posted: 26 Aug 2014 | Premiered: Aug 25, 2014

Dyn

Podcast: Opportunities with VMware and VMware vCHS
sponsored by Avnet Technology Solutions
PODCAST: The mobile-cloud era brings with it an increase in business and end-user expectations, and IT pays the price
Posted: 15 Sep 2014 | Premiered: Sep 5, 2014

Avnet Technology Solutions

EMM Challenges: Three Ways to Balance IT Needs With User Demands
sponsored by BlackBerry
WHITE PAPER: End-users for mobility rapidly demand more from their network providers.  This puts stress on IT professionals who are already busy dealing with complex security issues and day-today tasks. Read this whitepaper to see how enterprise mobility management is changing.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

BlackBerry

How We Define a Network is About to Change, Again
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn how VMware NSX changes the way that you build, manage, and secure your network.
Posted: 06 Oct 2014 | Published: 25 Sep 2014

Global Knowledge

How to Define SIEM Strategy, Management and Success in the Enterprise
sponsored by TechTarget
RESOURCE: With the recent, highly-publicized data breaches, ensuring you can efficiently detect and respond to security issues should be a top-priority. This expert guide, available exclusively to members who have completed our SIEM survey, provides the insight you need to develop or revamp your SIEM strategy to set the stage for success.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget

CDW’s Threat Check Assessment
sponsored by CDW Corporation
WEBCAST: This exclusive webcast breaks down the current malware landscape and explores an assessment tool that will help you identify malware in your network now and protect you in the future.
Posted: 07 Oct 2014 | Premiered: Apr 8, 2014

CDW Corporation

Tiket.com Customer Story
sponsored by IBM
WHITE PAPER: This white paper highlights a solution that allowed one company in particular to leverage a high-performance network with exceptional uptime and provided a smooth end-user experience.
Posted: 13 Oct 2014 | Published: 31 Dec 2013

IBM

Get Ready to Halt Cyber Attacks With IPS In Place
sponsored by HP and Intel
CASE STUDY: This case study highlights an intrusion prevention system (IPS) solution that is designed to secure network and critical data with intelligent and adaptive security measures.
Posted: 15 Aug 2014 | Published: 30 Jun 2014

HP and Intel

Mobile Device Management Checklist
sponsored by MobileIron
EGUIDE: A well thought-out mobile device management strategy is a key ingredient for any successful mobility deployment.  This expert E-Guide highlights a mobile device management checklist.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

MobileIron
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement