IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Network Perimeter Security Reports
Incognito Endpoint Network Access to Mitigate Identity Theft
sponsored by Unisys
WHITE PAPER: In this white paper, learn how to make endpoints dark on your network to users without the explicit permissions and authorization to view others in order to mitigate identity theft. Continue reading to learn how to reduce your network's and apps' attack surfaces through identity management and hiding access and devices.
Posted: 28 Sep 2015 | Published: 31 Dec 2014


Performance Reviews of 7 Next-Gen IPS Tools
sponsored by IBM
WHITE PAPER: This Gartner report looks at leading the next-generation IPS tools, giving detailed reviews on seven of the best.
Posted: 01 Sep 2015 | Published: 29 Dec 2014


Holistic Security for the Modern Threat
sponsored by Splunk
VIDEO: This video discusses the capabilities of a security platform that incorporates big data analytics, security investigating, and reporting, all of which can give you a holistic view of your network security.
Posted: 19 Aug 2015 | Premiered: 24 Jan 2014


Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Demo: Guarding against Today's Advanced Attacks
sponsored by Trend Micro
VIDEO: In this demo video, discover how you can revamp your security to guard against today's advanced attacks.
Posted: 29 Sep 2015 | Premiered: 29 Sep 2015

Trend Micro

Advanced Threat Detection and Remediation: Why it's Needed
sponsored by Hewlett-Packard Company
WHITE PAPER: An effective security program must not only attempt to detect and block incoming threats; it must detect and neutralize successful attacks before the damage is done, too. This white paper explains why advanced threat detection is now a necessary part of any cyber security program.
Posted: 09 Sep 2015 | Published: 09 Sep 2015

Hewlett-Packard Company

When Reputation is Not Enough: Spam Firewall Predictive Sender Profiling
sponsored by Barracuda Networks
WHITE PAPER: In this white paper, you'll uncover how to detect the uncharacteristic behavior of spam emails and blacklist the sender before the slew of spam hits your inbox.
Posted: 09 Sep 2015 | Published: 08 Jul 2015

Barracuda Networks

Bolster your Network Defenses Against Targeted Attacks and Advanced Threats
sponsored by Trend Micro
WHITE PAPER: In this brief white paper, uncover how to enable 360-degree detection across your network and go beyond incoming and outbound traffic.
Posted: 02 Oct 2015 | Published: 07 Aug 2015

Trend Micro

Wan Virtualization: Scaling Bandwidth and Increasing Application Reliability
sponsored by Citrix
WHITE PAPER: This white paper provides an overview of a cloud-based, WAN virtualization solution that will improve the performance and reliability of business critical applications such as VDI, application virtualization, VoIP, video conferencing, ERP and CRM. Read on now to increase effective network capacity.
Posted: 17 Sep 2015 | Published: 17 Sep 2015


Re-Architect Your Network for BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper describes the limitations of networks when supporting "bring your own device" policies and offers technologies that can be applied to solve them. Read on to see how re-architecting your network for BYOD can keep your network secure and simplified.
Posted: 30 Sep 2015 | Published: 30 Apr 2014

Hewlett-Packard Company
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement