IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security Reports
 
Should Employees Have Local Admin Rights?
sponsored by Viewfinity
EGUIDE: This expert guide lays out the pros and cons of granting users local admin rights and suggests strategies for maintaining safety if you do choose to give out those rights.
Posted: 16 Feb 2015 | Published: 01 Jan 2015

Viewfinity

Taking Hybrid WANs Further
sponsored by VeloCloud
WHITE PAPER: In this whitepaper, explore the additional ways to take the hybrid WAN further.  Read on to learn more.
Posted: 22 Dec 2014 | Published: 22 Dec 2014

VeloCloud

Bring Your Own Device: Driving Workforce Productivity with Bring Your Own Device (BYOD)
sponsored by Acronis
WHITE PAPER: In today's mobile world, workers want to work from anywhere- not just in the office. Bring Your Own Device (BYOD) policies increase employee productivity, but can also pose security risks. This white paper details to deploy a BYOD program that keeps information on mobile devices secure.
Posted: 16 Jan 2015 | Published: 16 Jan 2015

Acronis

Collaborative Defense – HP Security Research
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper from HP Security Research demonstrates why collaboration is essential in defending businesses from cyber attacks and how it can work.
Posted: 01 Feb 2015 | Published: 11 Dec 2014

Hewlett-Packard Company

Why DNS Security is Essential
sponsored by Cloudmark
WHITE PAPER: This white paper covers exactly how attackers use DNS to compromise a network.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Cloudmark

Deliver Robust Wi-Fi for Ultimate Guest Satisfaction
sponsored by Xirrus
WHITE PAPER: This exclusive white paper takes an in-depth look at how to provide rock-solid Wi-Fi connection for your guests, keeping them happy and productive. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

Xirrus

Executive ViewPoint - Successfully Securing Applications in a Mobility-Focused World
sponsored by F5 Networks
WHITE PAPER: In this whitepaper, F5's Karl Triebes and VMware's Kit Colbert share their perspectives on where the market is headed, and how IT organizations can stay ahead of the curve. Read on to learn more.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

F5 Networks

Spoofing Server-Server Communication: How You Can Prevent It
sponsored by Symantec Corporation
WHITE PAPER: In this must-read white paper, you'll learn how to prevent the new SSL Strip threat that could compromise your secure applications.
Posted: 19 Jan 2015 | Published: 31 Oct 2013

Symantec Corporation

What is Software Diversification?
sponsored by WhiteCryption
WHITE PAPER: This document describes the concept of software diversification and explains why it should be an integral part of the protection scheme of all software systems run on untrusted hosts. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

WhiteCryption

SDN Security Strategies for Network Attack Prevention
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.
Posted: 01 Feb 2015 | Published: 12 Dec 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement