IT Management  >   Systems Operations  >   Security  >   Network Security  >  

ID

RSS Feed    Add to Google    Add to My Yahoo!
ID Reports
 
An Executive Buyers' Guide to Identity and Access Management Solutions
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper examines some of the most important trends security managers need to be aware of and discusses the questions you need to ask when evaluating and possibly reforming your security strategy.
Posted: 29 Jan 2015 | Published: 29 Jan 2015

Ping Identity Corporation

Why You Need a Next-Generation Firewall
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper explores the reasons why enterprises benefit from implementing next-generation firewalls (NGFWs) and lays out a path to success.
Posted: 01 Feb 2015 | Published: 01 Feb 2015

Hewlett-Packard Company

Security Value Analysis: Breach Detection Systems
sponsored by Fortinet, Inc.
WHITE PAPER: This chart provides a quick, clear overview of several top breach detection systems by mapping their security effectiveness and value.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Fortinet, Inc.

Unified Threat Management Market Review: WatchGuard vs. Juniper, Cisco, Fortinet, and SonicWall
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Compare the major brands of security products by UTM throughput per MSRP dollar to see where you will get the best value for your money. Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Posted: 01 Jun 2010 | Published: 01 Apr 2010

WatchGuard Technologies, Inc.

Multi Stage Filtering
sponsored by APCON, Inc.
WHITE PAPER: This informative guide explores the current challenges networks face when it comes to increased traffic and how effective packet filtering can help you.
Posted: 07 May 2014 | Published: 07 May 2014

APCON, Inc.

12 Things Effective Intrusion Prevention Systems Should Do
sponsored by Dell, Inc.
WHITE PAPER: Uncover the top 12 features and functions that your intrusion prevention system (IPS) needs in order to defend against today's stealthy threats. Read on now to see if your organization is at risk.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Dell, Inc.

Practitioner's Guide to Establishing a SOC
sponsored by AlienVault
WHITE PAPER: This whitepaper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013

AlienVault

Rethinking Perimeter Security: New Threats Require Real-Time Protection
sponsored by Radware
WHITE PAPER: Over the last few years, networked resources have become increasingly available to a wide audience of customers, partners, suppliers, and the general public. As a result, more and more people have become reliant upon instantaneous access to information and services in order to do business.
Posted: 03 Mar 2011 | Published: 03 Mar 2011

Radware

E-Guide: Monitoring Strategies for Insider Threat Detection
sponsored by ArcSight, an HP Company
EGUIDE: Insider threat detection is a vital part of the security of any enterprise organisation. In this guide, learn about the three types of insider crimes and their own set of insider threat detection tactics.
Posted: 13 Dec 2010 | Published: 10 Dec 2010

ArcSight, an HP Company

Alternatives for Securing Virtual Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
ID White Papers | ID Multimedia | ID IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement