IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security Reports
Critical Capabilities for High-Security Mobility Management
sponsored by Good Technology
WHITE PAPER: Access this report to find critical capabilities for high-security mobile management, helping you in your next mobile security initiative.
Posted: 25 Nov 2015 | Published: 29 Jul 2015

Good Technology

Building Next Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how to build a next-gen IP communications architecture in your organization, delivering enterprise-grade connectivity, security, and control with a software-driven core. Access this paper to learn how to centralize your UC services and policies.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

Oracle Corporation

Transform Webcasting Services with Unified Communications Architecture
sponsored by VBrick
WEBCAST: This brief video illustrates how video hosting services can save you money, produce better quality, and enable you to host your own website videos. Learn how to manage all video content from a consumer-grade portal.
Posted: 02 Nov 2015 | Premiered: Nov 2, 2015


Best Practices to Enable Clinician Mobility for Patient-Centric Healthcare
sponsored by Citrix
WHITE PAPER: In this white paper, review mHealth best practices to enable secure remote access to PHI and other sensitive data.
Posted: 12 Nov 2015 | Published: 14 Oct 2014


How to Choose Your Next Sandboxing Solution
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper for a look at the eight essential qualities of effective sandboxing solutions and advice from Gartner on preventing the most sophisticated unknown malware from compromising your systems and networks.
Posted: 12 Nov 2015 | Published: 13 Jul 2015

Check Point Software Technologies Ltd.

Strategies for Advanced Threat Protection
sponsored by Symantec Corporation
WHITE PAPER: In this data sheet, you'll find a new strategy designed to uncover, prioritize, and remediate advanced attacks across all your endpoints. Access now and learn how to search for, discover, and remediate any attack artifacts across all of your endpoint systems.
Posted: 25 Nov 2015 | Published: 25 Nov 2015

Symantec Corporation

Digital Transformation Powers Your Business - Networking Thought Leadership
sponsored by Verizon
WHITE PAPER: This white paper discusses creating a better network by becoming a digital business. Digital networking allows for greater efficiency, insight, and security.
Posted: 11 Nov 2015 | Published: 11 Nov 2015


Traditional Security is Dead. Long Live Micro-Segmentation.
sponsored by Unisys
WHITE PAPER: This white paper outlines micro-segmentation's power to tip the balance of power back to IT and away from cybercriminals. Discover how to easily divide your physical networks into hundreds or thousands of logical micro networks, (analogous safe deposit boxes, rather than every network in a vulnerable vault).
Posted: 19 Nov 2015 | Published: 11 Nov 2015


How Big a Problem is Unknown and Targeted Malware, And What Can You Do About It?
sponsored by Check Point Software Technologies Ltd.
EGUIDE: Access this expert guide to learn how hackers avoid detection and how sandboxing and other technologies can help you stop them.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Check Point Software Technologies Ltd.

How Sandboxing puts a Stop to Today's Advanced Attacks
sponsored by Check Point Software Technologies Ltd.
VIDEO: This video introduces a modern approach to sandboxing that catches even the most evasive attack. Take a look to learn how you can upgrade your sandboxing capabilities to match today's advanced and zero-day attacks.
Posted: 16 Nov 2015 | Premiered: 20 Oct 2015

Check Point Software Technologies Ltd.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement