IT Management  >   Systems Operations  >   Security  >  

Network Security Threats

RSS Feed    Add to Google    Add to My Yahoo!
Network Security ThreatsReports
 
Eliminate Security Blindspots with New Encrypted Traffic Management Solutions
sponsored by Blue Coat Systems
RESOURCE: In this interactive guide, discover new encrypted traffic management solutions that can expose security blind spots without compromising privacy or regulatory compliance.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

Blue Coat Systems

Finding the Security Balance for Virtual Environments
sponsored by Kaspersky Lab
WHITE PAPER: This in-depth white paper will help you identify the right security approach for your virtual environment that won't be a drain your system's performance.
Posted: 21 Aug 2014 | Published: 21 Aug 2014

Kaspersky Lab

Data Centers in the Crosshairs: Today’s Most Dangerous Security Threats
sponsored by A10 Networks
WHITE PAPER: The following white paper describes the impact of the top 5 security threats and it reveals the latest methods, tools and techniques used by attackers to exploit data center resources. Then it lays out a framework to mitigate these threats leveraging technologies that are already present in most data centers today.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

A10 Networks

Managing Mobile Application Security in the Age of BYOD and the Cloud
sponsored by Bluebox
WHITE PAPER: In this expert guide, get an inside look at how to improve your organization's mobile app security and how to avoid the common pitfalls of cloud-based MAM.
Posted: 28 Aug 2014 | Published: 28 Aug 2014

Bluebox

The Definitive Guide to Establishing A Security Operation Center
sponsored by AlienVault
WHITE PAPER: In this informative white paper, discover how establishing a security operations center (SOC) can enable your organization to develop a fast, coordinated, and effective response to any and all cyber threats.
Posted: 09 Sep 2014 | Published: 09 Sep 2014

AlienVault

SAP Case Study
sponsored by Hewlett-Packard Company
CASE STUDY: With the escalating number and increasing sophistication of cyber-attacks, perimeter defenses are no longer enough. Companies who used HP Fortify on Demand—a cloud-based solution—saw results and achieved time to value faster. Read the report to learn how.
Posted: 04 Sep 2014 | Published: 31 Jul 2013

Hewlett-Packard Company

Countering Cyber Threats with Behavioral Analytics
sponsored by RSA, The Security Division of EMC
WHITE PAPER: This white paper explores how organizations can leverage big data and behavioral analytics in their network to foil the top attacks.
Posted: 29 Aug 2014 | Published: 29 Aug 2014

RSA, The Security Division of EMC

Get Tactical on Mobility: Managed Cloud-Based Options Balance Control with Flexibility and Scale
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this informative white paper to discover suggestions for a number of initiatives related to enterprise mobility, including mobility management and application access.
Posted: 25 Aug 2014 | Published: 30 May 2014

Hewlett-Packard Limited

Top Five Alternatives to Endpoint Antivirus Software
sponsored by Bit9 + Carbon Black
WHITE PAPER: In this in-depth Forrester report, discover the top 5 technologies that security professionals are using to replace outdated antivirus software.
Posted: 26 Aug 2014 | Published: 09 Jun 2014

Bit9 + Carbon Black

Have Control Over Remote Access—It's Time to Deploy New Laptops
sponsored by Dell, Inc. and Windows 8 Pro
WHITE PAPER: This white paper reveals several helpful tips surrounding the secure deployment of new laptops.
Posted: 08 Sep 2014 | Published: 08 Sep 2014

Dell, Inc. and Windows 8 Pro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement