IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

McKenna Long & Aldridge Chose Masergy's Managed Cloud Networking
sponsored by MASERGY
WEBCAST: With these Managed Cloud Networking solutions, the firm could open new offices quicker than ever before. Learn how you can leverage analysis tools to monitor network traffic and application usage patterns to gain predictive insights for strategic IT initiatives.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

Defend Against the Undetected
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper discusses how an automated, integrated security process can ensure a more secure network. Discover how this security strategy can efficiently defend your network from the perimeter to the core.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Masergy Unified Enterprise Security Demo
sponsored by MASERGY
WEBCAST: Access this webcast to discover how machine learning combined with continuous human monitoring can harden your defenses and improve your advanced threat detection capabilities.
Posted: 09 Jun 2016 | Premiered: May 1, 2016

MASERGY

Build a better wide area network with Managed Software-Defined WAN from Verizon
sponsored by Verizon
VIDEO: Flexibility, speed and performance are the three pillars of a dynamic WAN. Watch this 2 minute video to learn about a managed SD-WAN service that provides all three and more.
Posted: 26 May 2016 | Premiered: 26 Feb 2016

Verizon

Nemours case study
sponsored by MobileIron
CASE STUDY: Privacy is a top priority in the healthcare industry and, as such, security is of the utmost importance. As mobile devices become more prevalent in healthcare, ensuring security for these devices becomes a necessity. Uncover a case study about a healthcare provider that gave its employees secure mobility with a single solution.
Posted: 01 Jun 2016 | Published: 25 May 2016

MobileIron

The Threats Facing Financial Service Institutions in 2016
sponsored by Verizon
RESOURCE: Understand the nature of the security threat facing financial enterprises in 2016. Inside this paper you will find a quick, granular discussion of the sorts of attacks your network will be facing this year, and ways to inoculate your data from harm or theft.
Posted: 06 Jun 2016 | Published: 29 Apr 2016

Verizon

Why Threat Intelligence is Critical for Next Generation Firewalls
sponsored by Dell Software
WHITE PAPER: Read this paper and discover how a top-tier threat intelligence network makes the difference between an effective next-generation firewall and a mediocre one when it comes to defeating zero-day attacks and other advanced threats.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Securing the Small Business Network
sponsored by Dell Software
WHITE PAPER: In this resource, discover how to effectively secure your small business that faces an evolving threat landscape. Read on to explore eight challenges surrounding network security, and what you can do to mitigate and prevent any further attacks.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software

Are Next-Gen Firewalls the Best Defense Against Cyber Attacks?
sponsored by Dell Software
WHITE PAPER: Discover how next-generation firewalls provide you with a robust, reliable defense against cyber attacks. Find out how you can protect your network and your business by applying the right security technology.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement