IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security Reports
 
Security Considerations for Next Generation Network Access and Endpoint Compliance
sponsored by Aruba Networks
WHITE PAPER: Endpoint compliance assessments are critical for today's mobile workforce environment. This white paper explains how and where next-generation endpoint compliance should be enforced, as well as additional considerations that are critical for ensuring a secure network.
Posted: 27 Jun 2017 | Published: 18 Mar 2016

Aruba Networks

Troubling Trends in Network Security
sponsored by Gigamon
RESOURCE: Learn about which key issues are complicating network security, making it significantly harder than ever before, and find out how to combat with strategies for automation, networking monitoring, and analytics.
Posted: 22 Jun 2017 | Published: 22 Jun 2017

Gigamon

Simple AWS Networking with Application Defined SD-WAN
sponsored by AWS – Riverbed
WHITE PAPER: Many organizations that deploy the cloud are challenged with legacy network infrastructure and management tools. This white paper looks at how Riverbed SD-WAN can help organizations improve performance, agility, and security. Learn more about how to leverage your cloud-centric network.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

AWS – Riverbed

Top-10 Reasons for Selecting Array Networks Load Balancers
sponsored by Array Networks
RESOURCE: Discover the 10 most compelling reasons customers are choosing Array Networks load balancers to meet their application availability, performance and security requirements. Build your awareness of ADCs that are simple yet powerful and scalable yet cost-effective, and designed to meet technical requirements without compromising timelines or budgets.
Posted: 21 Jun 2017 | Published: 21 Jun 2017

Array Networks

14 Steps to Protect Your Organization from Ransomware
sponsored by Carbon Black
WHITE PAPER: Ransomware is on track to be a $1 billion crime in 2017, according to FBI data. That's a substantial increase from 2015, when ransomware was a "mere" $24 million crime. Uncover immediate steps you can take today to protect against ransomware like WannaCry and NotPetya.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Carbon Black

The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

Rackspace Fanatical Support for AWS
sponsored by Rackspace
WHITE PAPER: With everyone moving workloads to AWS, network security paradigms are shifting. This paper will discuss AWS security constructs and describe how they contribute to an overall security posture, and the new, non-siloed AWS governance model.
Posted: 08 Jun 2017 | Published: 06 Feb 2017

Rackspace

The Need for a New IT Security Architecture
sponsored by Citrix
WHITE PAPER: In a recent Ponemon Institute survey, 399 IT and IT security practitioners in the UK were asked about trends in IT security risks and why policies need to evolve in order to deal with threats from disruptive technologies. Access now to uncover their take on these topics and more.
Posted: 03 Aug 2017 | Published: 03 Aug 2017

Citrix

30 Minutes to a More Secure Enterprise
sponsored by Comstor
WHITE PAPER: Traditional defenses are no longer enough as under-the-radar attacks are wreaking havoc on enterprises that rely on antivirus products, firewalls, and sandboxing alone. Given the strain on your staff and already tight budget, DNS-layer security is becoming more valuable, especially as your first line of defense.
Posted: 29 Jun 2017 | Published: 29 Jun 2017

Comstor

Incident Response for Today's Top 3 Security Scenarios
sponsored by Exabeam
WHITE PAPER: This whitepaper looks at the top three security scenarios that are ripe with risk to the organization, and discusses steps to properly respond should these events occur.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Exabeam
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement