IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security Reports
 
Discover the Keys to Fast App Deployment
sponsored by BT
DATA SHEET: Do your IT professionals find themselves bogged down in an endless cycle of configuration, testing and local rollout? Learn how to increase your agility, and save your IT managers the endless hassle of manual deployment with cloud-based app automation. Download this paper now to get SLA-assured availability and security.
Posted: 02 Aug 2016 | Published: 31 Dec 2014

BT

PSA Buyer's Guide
sponsored by Autotask Corporation
WHITE PAPER: In this buyer's guide you'll discover a step-by-step process for technology service providers to compete in one of the fastest and most disruptive business environments in the industry.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Autotask Corporation

New Malware Analysis Data in OpenDNS Investigate
sponsored by OpenDNS
WEBCAST: Learn how a threat intelligence tool can help you understand not only domain and IP data, but also file hashes. Using this expanded capacity, your security team can more thoroughly interrogate threats to your enterprise.
Posted: 26 Jul 2016 | Premiered: May 25, 2016

OpenDNS

The Pros and Cons of Microsegmentation for your Virtualized Environments
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Microsegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.
Posted: 28 Jun 2016 | Published: 24 Jun 2016

NTT Com Security (UK) Ltd

South Carolina Federal Credit Union Uses an ADC to Implement an SSL Environment
sponsored by Array Networks
CASE STUDY: When converting to an SSL-secured environment, your business must have the correct application delivery controller (ADC) employed to ensure server performance. Make an informed decision when selecting your ADC, by reading this case study which explains how one business benefitted from an ADC implementation.
Posted: 29 Jun 2016 | Published: 28 Jun 2016

Array Networks

Advanced Endpoint Protection for Windows Server 2003 After End-of-Support
sponsored by Palo Alto Networks
WHITE PAPER: Identify how you can maintain security in your network, despite the fact that Windows Server 2003 has reached its End-of-Support.
Posted: 01 Jul 2016 | Published: 01 Jul 2016

Palo Alto Networks

Network Security Playbook Guide
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Successful enterprises deal with network security threats quickly and efficiently by relying on network security playbooks. Access this white paper that explains how to build your playbook and highlights a security platform that can be crucial to your network security.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Manage risk by protecting apps, data and usage
sponsored by Citrix
WHITE PAPER: This white paper teaches you best practices to control apps and modern methods to secure your mobile workforce. Discover how to assure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Enterprise Mobility: How Mobile Device Management Exploded to Include Devices, Apps and Content
sponsored by IBM MaaS360
WHITE PAPER: Today, nearly every enterprise works with mobile devices, but few know how to maximize their potential. So, how do you turn mobility into a valued asset? Access this white paper to learn about workplace mobility and how to successfully implement a unified mobile policy.
Posted: 09 Aug 2016 | Published: 31 Mar 2016

IBM MaaS360

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 11 Jul 2016 | Published: 11 Jul 2016

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement