Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Software Reports
1 - 25 of 127 Matches Previous Page  |  Next Page
Securing the Payment Card Industry in Physical, Virtual and Cloud Environments
sponsored by Trend Micro
WHITE PAPER: Access this white paper for an in-depth look at how you can enjoy all of the benefits of a virtual PCI data center without having to worry about PCI Data Security Standard 3.0 compliance.
Posted: 20 May 2015 | Published: 24 Apr 2015

Trend Micro

The Real Costs of a DNS Outage
sponsored by Nominum, Inc.
CASE STUDY: This paper details the costs that were incurred by a global broadband provider after a DoS attack compromised their DNS. Access now and learn about the harsh realities of an ill-prepared infrastructure that couldn't cope with services outages. Read on to learn how you can prepare your own business to avoid a similar fate.
Posted: 14 May 2015 | Published: 14 May 2015

Nominum, Inc.

Case Study: Large ISP Transforms DNS, Protects Network
sponsored by Nominum, Inc.
CASE STUDY: The following case study examines how Nominum helped a large North American ISP transform their DNS infrastructure, which in turn allowed the ISP to foil the DDoS attack and safeguard them from further DNS exposure. Access now and learn how you can do the same in your business.
Posted: 14 May 2015 | Published: 14 May 2015

Nominum, Inc.

Case Study: Large ISP Gains Visibility & Control During DDoS Attack
sponsored by Nominum, Inc.
CASE STUDY: The following case study details how with the help of Nominum, the large South American ISP was able to hinder and overcome the DDoS attack. Access now and learn how Nominum had kept the provider informed of DNS DDoS developments for several months and was immediately prepared to help, keeping harm down and morals up.
Posted: 14 May 2015 | Published: 14 May 2015

Nominum, Inc.

Securing Your End of Life Servers While Enabling a Safe Transition
sponsored by Trend Micro
WHITE PAPER: Access this white paper to learn how to continue running your end of life platform while avoiding common security risks and preparing to upgrade your system.
Posted: 07 May 2015 | Published: 30 Apr 2015

Trend Micro

5 Key Design Principles for Security Professionals
sponsored by Gigamon
WHITE PAPER: In this white paper, discover 5 key design principles for security professionals looking to better protect their networks from the latest generation of cyber criminals.
Posted: 14 Apr 2015 | Published: 26 Sep 2014

Gigamon

Choosing the Right Security Solution: Moving Beyond SSL
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paperpresents a buyer's guide to choosing a next-gen SSL platform to secure consumer personal information and enterprise data. View now to learn the tell-tale signs of a faulty platform and the key characteristics to look for in a trusted strategy.
Posted: 03 Apr 2015 | Published: 06 Nov 2013

GeoTrust, Inc.

Mobile App Reputation and Risk Management for Network Security
sponsored by Veracode, Inc.
WHITE PAPER: In this white paper, you'll discover a new solution to application risk management that provides detailed behavioral intelligence about mobile apps.
Posted: 03 Apr 2015 | Published: 03 Apr 2015

Veracode, Inc.

5 Keys to Unlock an Easy Network Access Control Implementation
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll discover the 5 keys to unlocking easier NAC implementation.
Posted: 02 Apr 2015 | Published: 02 Apr 2015

Great Bay

Is Your Network Truly Secure? A Solution to Full Network Visibility and Protection
sponsored by Great Bay
WHITE PAPER: This white paper explains how one company was able to implement a simple solution to increase their network visibility and improve network security.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

Great Bay

Unruly NAC agents? Unveil a superior foundation for network security instead
sponsored by Great Bay
WHITE PAPER: In this white paper, you'll learn why enterprises agonize over NAC deployments and you'll discover a new approach to full network security.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Great Bay

What's really on your network?
sponsored by Great Bay
WHITE PAPER: Access this white paper now to learn 5 tips for securing your network from rogue devices.
Posted: 31 Mar 2015 | Published: 31 Mar 2015

Great Bay

The Shifting Role of IT Balancing Corporate Needs and Employee Expectations
sponsored by Dropbox for Business
WHITE PAPER: In this white paper, you'll learn what you need to do to effectively secure your enterprise data in this world of BYOA movements.
Posted: 30 Mar 2015 | Published: 28 Mar 2014

Dropbox for Business

MAC Spoofing Webinar: Learn to Protect Yourself from Data Breaches
sponsored by Great Bay
WEBCAST: In this webinar, you will learn the top 3 challenges to securing your network from MAC spoofing, a popular way for hackers to attack your data, and how to overcome them.
Posted: 27 Mar 2015 | Premiered: Mar 2, 2015

Great Bay

Overcoming Evolving Cyberthreats and Next-Gen Firewalls
sponsored by Juniper Networks, Inc.
WEBCAST: In this webcast, learn how to deal with new threats as they evolve and design dynamic security into cloud environments.
Posted: 24 Mar 2015 | Premiered: Dec 4, 2014

Juniper Networks, Inc.

Web security meets DDoS Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: John Pescatore explores new DDoS attack vectors and discusses incident response planning (tools and processes) you need to plan for in 2015.
Posted: 18 Feb 2015 | Premiered: 20 Feb 2015

SearchSecurity.com

Cloudmark Security Platform for DNS
sponsored by Cloudmark
ASSESSMENT TOOL: If you suspect that your DNS has been compromised, use this DNS analysis page from Cloudmark to send them a traffic sample for complimentary analysis—the first step to take along the path to proven security success.
Posted: 16 Feb 2015 | Published: 16 Feb 2015

Cloudmark

Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015

SearchSecurity.com

Forrester on Addressing IT Challenges in Today's Mobile World
sponsored by Commvault
WEBCAST: In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.
Posted: 30 Dec 2014 | Premiered: Feb 28, 2013

Commvault

How Managed Endpoint Security Can Help Expand Your Managed Services Business
sponsored by Solarwinds N-able
WHITE PAPER: In this white paper, learn how utilizing a single integrated management platform for malware protection can help Managed Service Providers (MSPs) streamline and standardize their security efforts, and the many benefits of implementing managed endpoint security for MSPs and their customers.
Posted: 30 Jul 2014 | Published: 30 Jul 2014

Solarwinds N-able

Achieve Enterprise-wide Network Visibility with Monitoring Tool
sponsored by LogRhythm, Inc.
PRODUCT LITERATURE: True enterprise security intelligence requires real-time awareness and an understanding of all data traversing the network. The LogRhythm Network Monitor provides both application level awareness and rich network session details, delivering enterprise-wide network visibility. View this datasheet to learn more about this network monitoring tool.
Posted: 25 Jul 2014 | Published: 31 Mar 2014

LogRhythm, Inc.

Comparing Security Information and Event Management (SIEM) Technologies
sponsored by IBM
WHITE PAPER: This highly informative white paper from Gartner objectively evaluates a variety of SIEM technologies on a number of critical dimensions, including market responsiveness, customer experience, and pricing.
Posted: 24 Jul 2014 | Published: 25 Jun 2014

IBM

Is UTM Ready for the Big Leagues?
sponsored by SearchSecurity.com
EBOOK: This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.
Posted: 10 Jul 2014 | Published: 10 Jul 2014

SearchSecurity.com

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Getting the Most out of your NextGen Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.
1 - 25 of 127 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement