IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security Reports
 
Behavioral Analytics: Let Your Data Tell the Story
sponsored by Prelert
WEBCAST: In this brief webcast, learn how to analyze log data, find anomalies, and like them together faster. Uncover the steps to understand not only what happened in an incident, but how it happened as well. View now to learn more.
Posted: 02 Feb 2016 | Premiered: Jan 20, 2016

Prelert

Modern Mobility E-zine – January
sponsored by SearchMobileComputing
EZINE: In this issue of Modern Mobility, you will discover why many IT departments continue to struggle with compliance in the mobile era, and what tools are available to help admins get a better grasp on best practices. Access this e-zine to also get an exclusive, in-depth look at how to ease EMM for the modern era.
Posted: 13 Jan 2016 | Published: 08 Jan 2016

SearchMobileComputing

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Best Practices for Communication and Engagement in Healthcare
sponsored by 8x8, Inc.
EGUIDE: In this expert e-guide, discover how healthcare providers are overcoming the security risks imposed by today's electronic methods of communication – specifically telemedicine – in order to safeguard physician-patient communication.
Posted: 04 Jan 2016 | Published: 04 Jan 2016

8x8, Inc.

Bolster Network Security for the Latest Social Engineering Tactics
sponsored by WatchGuard Technologies, Inc.
VIDEO: This brief video explores customized social engineering tactics that can compromise your network security. Tune in for a quick security recommendation that get you up to speed on the latest social engineering techniques.
Posted: 19 Jan 2016 | Premiered: 10 Dec 2015

WatchGuard Technologies, Inc.

Making Software-Defined Security Work for Your Data Center
sponsored by NTT Com Security (UK) Ltd
WHITE PAPER: This white paper explores micro-segmentation, a new and popular network security approach, and how to stop hackers from moving laterally within the data center.
Posted: 05 Feb 2016 | Published: 30 Dec 2015

NTT Com Security (UK) Ltd

Anomaly Detection in Periodic Data
sponsored by Prelert
WHITE PAPER: This white paper examines how machine learning anomaly detection can cut through the vast amounts of periodicity to reveal the true abnormal and potentially malicious behavior within your network/systems. Read on and discover how to accurately locate deviations in expected network behavior.
Posted: 05 Feb 2016 | Published: 10 Apr 2015

Prelert

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

Detect Network Anomalies with the Right Netflow Analysis Tool
sponsored by Lancope
WHITE PAPER: In this article, a security expert discusses how he found a security tool that met his netflow analysis needs. Read on and learn how you can obtain the deep network insights necessary for stopping advanced hacks in your organization.
Posted: 04 Jan 2016 | Published: 18 Nov 2014

Lancope

Threat Monitoring in Tough Times
sponsored by SearchSecurity.com
EBOOK: Threat monitoring today is tough. The bad guys move fast and hide well. Learn the latest tactics for keeping systems safe.
Posted: 23 Dec 2015 | Published: 15 Dec 2015

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement