IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security Reports
 
Customer story - Broward Health
sponsored by Citrix
VIDEO: Watch this video to learn how one of the largest healthcare systems in the United States was able to adopt a suite of products that enabled improved efficiency, mobility and security, the three most important aspects to the industry.
Posted: 13 May 2016 | Premiered: 08 Oct 2013

Citrix

Application Session Filtering
sponsored by Gigamon
WHITE PAPER: Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.
Posted: 27 May 2016 | Published: 31 Dec 2015

Gigamon

The Demand for Hybrid Online File Sharing Solutions
sponsored by Citrix
RESEARCH CONTENT: Learn about the overwhelming need for online file sharing and collaboration (OFS) solutions, approaches being taken to providing alternative solutions, and what is prompting so many enterprises to search for the solution that best suits their needs.
Posted: 10 May 2016 | Published: 31 Dec 2014

Citrix

Market Focus Double Vision
sponsored by Gigamon
WHITE PAPER: It's time to get real with security realities. Understand how to achieve greater visibility into your network traffic and learn where other organizations stand in the cyber security war.
Posted: 17 May 2016 | Published: 01 Feb 2016

Gigamon

Top 6 Security Measures for the Enterprise Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper details a next-generation security model that moves away from traditional security tools. Access now to learn how you can bring together all critical network security elements to provide an integrated security framework for your cloud-enabled enterprise.
Posted: 11 May 2016 | Published: 01 Apr 2016

Juniper Networks, Inc.

What does mobility really mean?
sponsored by Citrix
VIDEO: Watch this video to learn the current perceived meaning of mobility and what it should mean. You'll also find a joint mobility solution that utilizes cloud storage and safety best practices to enable your employees to share data, collaborate, and much more.
Posted: 13 May 2016 | Premiered: 06 Oct 2014

Citrix

SDN network security: Building a safer architecture
sponsored by VMware
EGUIDE: As mobile devices and IoT increase the number of network connections, organizations can no longer rely on a hardened network perimeter to prevent cyberattacks. Software-defined networking (SDN) technology enables networks to better secure themselves and provide capabilities to enhance the network's ability to identify and remediate cyberattacks.
Posted: 17 May 2016 | Published: 04 May 2016

VMware

Top ten reasons you don’t need Mobile Device Management (MDM)
sponsored by IBM MaaS360
WHITE PAPER: Mobile device management (MDM) is a dying trend. Like the frosted tip hairstyles and low-rise jeans of the 90's, smartphones are just another fad that'll be replaced soon enough. Read on for ten reasons why you don't need to bother with this MDM nonsense.
Posted: 20 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Small Business IT Security: Save Money, Save Face
sponsored by CDW
ANALYST BRIEF: This article from security expert Mark Lachniet shows you strategic steps your SMB can take to ensure your limited IT budget doesn't mean increased cybersecurity risks. You'll learn four specific guidelines to help you understand your greatest vulnerabilities lie and how to cost effectively mitigate them.
Posted: 11 May 2016 | Published: 18 May 2016

CDW

Beyond CLM and MDM: Why your Organization needs Unified Endpoint Management (UEM)
sponsored by Matrix42
WHITE PAPER: Unified endpoint management (UEM) combines mobile device management with client lifecycle management to create a new central management environment. Read on to learn more about how UEM works and its benefits for businesses, IT and users.
Posted: 19 May 2016 | Published: 30 Dec 2015

Matrix42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement