IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter SecurityReports
 
Network Evolution – July/August 2014
sponsored by SearchNetworking.com
EZINE: Learn how context-aware security makes network security policy smarter -- but only with a solid foundation. We also cover hybrid SDN and programming for network engineers.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchNetworking.com

Data Wrapping and User Experience: Two Keys to BYOD Mobile Data Security
sponsored by Bluebox
WHITE PAPER: This white paper examines a new mobile security solution that avoids the pitfalls of traditional systems by employing data-centric and employee-centric methods.
Posted: 18 Aug 2014 | Published: 18 Aug 2014

Bluebox

Why the World's Leading Businesses Trust BlackBerry
sponsored by BlackBerry
WHITE PAPER: Enterprise Mobility Management (EMM) is no easy task. However, with the right tools and a trusted partner any problem can be solved.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

BlackBerry

Meet Client Needs While Ensuring Corporate Data and Device Security
sponsored by Fiberlink
CASE STUDY: After making the switch from mobile phones to smartphones, companies need an easy-to-use enterprise mobility solution that can ensure device, data, and email security.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Fiberlink

What to look for when evaluating NGFW
sponsored by Dell Software
WHITE PAPER: This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

Application Delivery Optimization Tools: Evaluating Solutions and the Market
sponsored by F5 Networks
EGUIDE: This expert e-guide highlights 18 questions that will help you pinpoint the best fit tools for your application delivery optimization needs. Additionally, read on to learn how the application delivery controller (ADC) market is changing as enterprises adopt cloud services.
Posted: 05 Aug 2014 | Published: 05 Aug 2014

F5 Networks

The HP IT Insights Series—Volume 9 - Get the facts about SDN: Debunk six myths standing in the way of network
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper will help you debunk 6 myths about software-defined networking (SDN) that stand in the way of network innovation.
Posted: 10 Sep 2014 | Published: 28 Feb 2014

Hewlett-Packard Company

The Ten Principals of BYOD
sponsored by IBM
WHITE PAPER: Uncover the top ten Bring Your Own Device (BYOD) considerations to keep in mind when composing a BYOD policy to ensure a productive and secure environment which allows your employees to use their consumer-based devices to complete day to day tasks.
Posted: 03 Sep 2014 | Published: 28 May 2014

IBM

Identity Analytics: Exposing the "Who" in Anonymous Log and Machine Data
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper discusses LogRhythm's Identity Inference Engine™, which combines already-collected machine data with advanced analytics to automatically identify who is responsible for activities in your IT environment, a critical component of maintaining a secure network.
Posted: 31 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement