IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security Reports
 
White paper: Network management and operational efficiency
sponsored by Forcepoint
WHITE PAPER: Learn how to make a NGFW work for your enterprise, both in the sense of security and the bottom line. Discover the intricacies of these firewalls, and what your enterprise might or might not need to manage one towards its potential.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Forcepoint

The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Palo Alto Networks

ESG Lab Review: Performance and Scalability as Key Firewall Requirements
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

NGFW Requirements for SMBs and Distributed Enterprises
sponsored by Cisco Systems, Inc.
WHITE PAPER: Within this informative white paper, you'll discover NGFWs specifically tailored for your SMB as well as distributed enterprises. Learn how to achieve next generation security with advanced threat protection, low TCO, and flexible management.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

Cisco Systems, Inc.

The Best Ways to Manage Shadow IT
sponsored by Juniper Networks, Inc.
ESSENTIAL GUIDE: Shadow IT raises challenges, namely security, integration, and operational ones. This essential guide looks at the trends that are driving the rise of shadow IT, explores the drawbacks and benefits it offers and explains how to design the right network for your preferred shadow IT strategy.
Posted: 06 Sep 2016 | Published: 30 Oct 2015

Juniper Networks, Inc.

Cyber Security Recommendations from the C-Suite
sponsored by Radware
WHITE PAPER: From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Radware

When and How to Go Beyond EMM to Ensure Secure Enterprise Mobility
sponsored by Lookout
RESOURCE CENTER: How can you create a mobile security strategy that leverages best-of-breed EMM capabilities with the strongest mobile security tools? Access this Gartner report that will help you deploy the right tools by pointing out the differences between security built into EMM and additional security provided by the most recent cost-effective solutions.
Posted: 31 Aug 2016 | Published: 10 Jun 2016

Lookout

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Optimize High-Performing DNS Infrastructures for Greater Security
sponsored by EfficientIP
WHITE PAPER: In this white paper, you will examine three methods of optimizing DNS infrastructure to achieve greater security, performance, simplicity, and a drastic reduction in TCO. Access now to learn how to eliminate useless server farms to reduce energy costs and improve protection against furtive attacks.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement