IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed    Add to Google    Add to My Yahoo!
Computer Network Security Reports
The 10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This white paper presents 10 key points to consider as you develop your enterprise mobility strategy—from security to BYOD. Unlock the full potential of your mobility, and develop a comprehensive and security-conscious mobility strategy for your organization.
Posted: 28 Oct 2015 | Published: 31 Oct 2014


Manage and Protect your Business with SaaS-Based Server Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This brief outlines how to integrate your server and security strategies. Discover how the right combination can bring you enhanced productivity, collaboration, and security.
Posted: 16 Nov 2015 | Published: 29 Nov 2013

Hewlett Packard Enterprise

Security Intelligence for the Modern Data Center
sponsored by AccelOps Inc.
WHITE PAPER: Organizations need an intelligent approach to understand data and proactively detect security threats and anomalies. In this white paper, learn how to consolidate security, performance, and compliance monitoring into a single pane of glass to improve protection across environments
Posted: 17 Nov 2015 | Published: 03 Nov 2015

AccelOps Inc.

20 Critical Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores how you can obtain versatile and comprehensive security by adopting twenty essential security controls.
Posted: 04 Nov 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

How to Provide Accelerated Triage for Cisco UC/Jabber
sponsored by NetScout Systems, Inc.
PRODUCT OVERVIEW: In this brief resource, you will learn how to improve your UC service delivery and IT collaboration with a UC server, complete with real-time call quality performance monitoring. Discover how to quickly resolve service quality issues with proactive application and network analyses and service quality alerts.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

NetScout Systems, Inc.

Device Fingerprinting: A New Tool for Enhanced Application Protection
sponsored by Radware
WHITE PAPER: This white paper outlines the 5 common factors challenging IP-based identification and presents an overview of device fingerprinting to gather IP-agnostic information to detect malicious sources and users. View now and discover how to mitigate today's top app threats including, web scraping, bots, DDoS, and more.
Posted: 19 Nov 2015 | Published: 05 Jan 2015


Maintaining a DDoS Mitigation Plan
sponsored by Akamai
WHITE PAPER: Discover how to prepare for DDoS attacks through clear organized communication in the security chain in this exclusive white paper. Read on to learn the top 9 best practices for developing and maintaining a DDoS mitigation plan
Posted: 20 Nov 2015 | Published: 11 Nov 2015


Best Practices to Enable Clinician Mobility for Patient-Centric Healthcare
sponsored by Citrix
WHITE PAPER: In this white paper, review mHealth best practices to enable secure remote access to PHI and other sensitive data.
Posted: 12 Nov 2015 | Published: 14 Oct 2014


Experts Assess the Isilon HD400 NAS Platform
sponsored by SI Systems
EGUIDE: In this e-guide, experts discuss a NAS array system designed to meet deep-archive storage needs. Access now and you'll also uncover a case study of how one Canadian power company was able to use a Hadoop cluster that runs on NAS storage, allowing them to process data indicating whether or not someone was illegally tapping into their energy grid.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

SI Systems

Cybersecurity Strategy Needs to be More Dynamic
sponsored by Unisys
EGUIDE: This expert e-guide explores app vulnerabilities and security strategy shortcomings and how you can fill in the gaps and adjust your approach to adapt to the changing threat landscape. View now to learn why a walled network will enable more data breaches to succeed and how to take a more holistic view of cybersecurity.
Posted: 20 Nov 2015 | Published: 18 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement