IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter SecurityReports
 
How to Define SIEM Strategy, Management and Success in the Enterprise
sponsored by TechTarget
RESOURCE: With the recent, highly-publicized data breaches, ensuring you can efficiently detect and respond to security issues should be a top-priority. This expert guide, available exclusively to members who have completed our SIEM survey, provides the insight you need to develop or revamp your SIEM strategy to set the stage for success.
Posted: 24 Oct 2014 | Published: 09 Sep 2014

TechTarget

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

Overcoming exploits that use advanced evasion techniques and SSL encryption
sponsored by Dell Software
WHITE PAPER: To defend against today's advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

How a service city improved their SMS alert system
sponsored by TalariaX
CASE STUDY: Access this case study to learn about an SMS alert system that was deployed in a California service city that was complementary to the existing fire department infrastructure but also enhanced communication capabilities for a more efficient and reliable notification system, while maintaining a low capital investment.
Posted: 17 Sep 2014 | Published: 31 Dec 2012

TalariaX

Mobile Device Management Checklist
sponsored by MobileIron
EGUIDE: A well thought-out mobile device management strategy is a key ingredient for any successful mobility deployment.  This expert E-Guide highlights a mobile device management checklist.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

MobileIron

SDN meets the real-world: implementation benefits and challenges
sponsored by Nuage Networks
WHITE PAPER: From little more than a research project a decade or so ago, SDN has become one of the biggest trends in the data center, and for good reason.
Posted: 03 Oct 2014 | Published: 03 Oct 2014

Nuage Networks

Mitigating Security Risks at the Network's Edge: Best Practices for Distributed Enterprises
sponsored by CradlePoint
WHITE PAPER: Access this white paper to discover the keys to preventing data breaches in distributed enterprises.
Posted: 04 Sep 2014 | Published: 04 Sep 2014

CradlePoint

5 Tips for Guest BYOD Use
sponsored by North Sydney IT and Cisco
WHITE PAPER: If your midsize company welcomes guests and their mobile devices, read this white paper. Get five tips for guest BYOD use.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

North Sydney IT and Cisco

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Get the Most Value Out of Network Security
sponsored by HP and Intel
WHITE PAPER: This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.
Posted: 20 Aug 2014 | Published: 01 Dec 2014

HP and Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement