IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security Reports
 
Securing the Private Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: The demands on private cloud all too often leave operators in a position of favoring performance and agility over security. This white paper details how you can protect your private cloud environment by building security into the network that can accommodate powerful threat detection technologies while maximizing throughput and flexibility.
Posted: 07 Nov 2016 | Published: 28 Jul 2016

Fortinet, Inc.

Key Features To Consider When Deciding On A NGFW Technology
sponsored by Forcepoint
WEBCAST: There are 3 main drivers to your NGFW technology deployment success: integration with security workflow, total cost of ownership, and security effectiveness. But which one will work best for your distributed enterprises? In this webcast, learn key features to consider when selecting your technology, and discover insights on the testing process.
Posted: 17 Feb 2017 | Premiered: Feb 17, 2017, 01:01 EST (06:01 GMT)

Forcepoint

The Definitive Guide to Selecting the Right ADC for the Digital Transformation Era
sponsored by Citrix
EBOOK: Explore what considerations should drive app delivery controller (ADC) management to navigate the increasing complexities of planning for change and digital transformation. Discover how to boost your app delivery strategy and network management by harnessing the power of the cloud to adapt to hybrid environments and microservice architectures.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Citrix

Seeing Through the Clouds: Cloud Visibility Improves Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Is network telemetry is the key to better cloud security? Learn how network telemetry can expand advanced visibility, threat detection, and security analytics capabilities to the cloud for more comprehensive network protection.
Posted: 15 Dec 2016 | Published: 30 Sep 2016

Cisco Systems, Inc.

EMM with Centralized, Secure Control: Garuda Indonesia Case Study
sponsored by IBM
CASE STUDY: This case study explores how Garuda Indonesia implemented a more comprehensive enterprise mobility management (EMM) strategy. Discover how they streamlined management of mobile devices, managed iPads, apps, and content centrally and securely, leveraged SaaS to reduce costs, and boosted productivity by up to 50%.
Posted: 15 Feb 2017 | Published: 31 Dec 2016

IBM

Supercharge Your Networking Career
sponsored by VMware
WHITE PAPER: IT teams that rely on hardware-centric networks are struggling to keep up with the demands of today's business users. In this infographic, learn how you can supercharge your network and your career with network virtualization.
Posted: 21 Feb 2017 | Published: 29 Apr 2016

VMware

High Availability DNS Reduces Downtime Risk and Improves End-User Experience
sponsored by Dyn
WHITE PAPER: This white paper reviews the business advantages of implementing a high availability DNS architecture. You'll learn the critical role DNS plays in the user experience, the risks of relying on a single DNS solution, and the added performance benefits of a high availability DNS architecture.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Dyn

Fast Breach Mitigation Without Network Disruption
sponsored by Ixia
WHITE PAPER: With network breaches unfolding with growing frequency, your ability to quickly mitigate a crisis begins with knowing where it occurred, and what data was compromised. Discover how to capture the critical data you need to respond more rapidly to emerging situations.
Posted: 08 Feb 2017 | Published: 30 Dec 2016

Ixia

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

What's the Best Way to Protect the Network from APT Attacks?
sponsored by Fortinet, Inc.
EGUIDE: This expert guide reveals several ways that you can protect your network from APT attacks. Inside you will see how, from initial infection to data exfiltration, an APT manifests and removes your supposedly secure data.
Posted: 12 Dec 2016 | Published: 12 Dec 2016

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement