IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network SecurityReports
 
Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

DLP’s Three Lock Box
sponsored by CDW Corporation
WHITE PAPER: This white paper examines what data loss prevention (DLP) solutions entail, how to select them, and what DLP can do for your organization.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

CDW Corporation

Data Loss Prevention: From Business Problem to Technical Solution
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Five Questions to Ask Every Vendor: SDN Evaluation Guide
sponsored by Extreme Networks
WHITE PAPER: With all of the great benefits of SDN, there's no doubt any organization is looking into it.  But is your company the right fit?
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Extreme Networks

Networking Evolution: Building the Infrastructure to Enable the Changing Face of IT
sponsored by Citrix
WHITE PAPER: This expert resource explores the top trends and challenges facing networks today. Topics include hybrid software-defined networking, context-aware security, unified communications, and more.
Posted: 10 Sep 2014 | Published: 10 Sep 2014

Citrix

Cloud Web Security Alleviates Network Congestion
sponsored by Cisco
CASE STUDY: This case study reveals how building supplies distributor MacArthur Corporation, secured internet use in the cloud in order to relieve network congestion, without adding any bandwidth.
Posted: 03 Sep 2014 | Published: 31 Dec 2012

Cisco

Everything you need to know about MDM, MAM, & BYOD
sponsored by CA Technologies.
BOOK: This e-book gives you an expert look at many of the hot mobility trends in organizations today.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

CA Technologies.

How to Detect a Ransomeware Infection with AlienVault USM
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how to detect and prevent ransomware from holding your network hostage.
Posted: 08 Oct 2014 | Premiered: Oct 8, 2014

AlienVault

Presentation Transcript: Opportunities with VMware and VMware Horizon 6
sponsored by Avnet Technology Solutions
PRESENTATION TRANSCRIPT: This audio cast transcript talks about how VMware can lower overall costs while maintaining clouds for both public and private networks.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

Avnet Technology Solutions

How SSL and TLS Secure Network Transactions
sponsored by Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement