IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
OpenDNS Umbrella
sponsored by OpenDNS
VIDEO: Learn about a first line of defense that can protect your IT infrastructure and monitor for emergent threats.
Posted: 25 Jul 2016 | Premiered: 31 May 2016

OpenDNS

The Move to Software-based Everything – How Secure is Programmable Infrastructure?
sponsored by Cisco and Dimension Data
WHITE PAPER: Software-based systems promise more flexibility, scalability, and automation.But, how vulnerable is a programmable infrastructure? Access this white paper that discusses the vulnerability of programmable infrastructures and how to properly secure them.
Posted: 25 Jul 2016 | Published: 31 Dec 2014

Cisco and Dimension Data

BYOD Doesn't Have to be Your Biggest Headache
sponsored by Aruba Networks
WHITE PAPER: Security for BYOD and mobile initiatives must now be part of a larger conversation when securing the network for the new digital workplace. Based on existing best practices, this white paper outlines eight things you can do to boost network security amidst BYOD.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Aruba Networks

Can We Say Next-Gen Yet? State of Endpoint Security - SANS Report
sponsored by IBM
WHITE PAPER: Discover how to formulate your own new endpoint protection strategy based around these ever changing endpoint devices. See how other organization are protecting their evolving perimeter and learn statistics from the SANS 2016 Endpoint Security Survey that will help you create your long-term endpoint management strategy.
Posted: 27 Jul 2016 | Published: 01 Mar 2016

IBM

Global Fiber CDN: Fast, Secure, Reliable
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Make sure you meet user expectations by delivering video content and digital downloads to any type of device, anywhere. Read this infographic for all the benefits of employing a global fiber CDN at your business.
Posted: 29 Jun 2016 | Published: 27 Jun 2016

Level 3 Communications, Inc.

Behind the Mask: The Changing Face of Hacking
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This new report will help you learn more about hackers and how they work. Read it to understand what attack methods hackers use, why simple approaches like phishing still work, and more.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

How Strongarm's Malware Protection Solution Works
sponsored by eTECH Channel
DATA SHEET: You need an efficient way to stop malware from damaging your customers' businesses. Discover simple and automated malware protection that will help you protect customer networks while minimizing complexity.
Posted: 21 Jul 2016 | Published: 01 Jun 2016

eTECH Channel

Secure your mobile devices, data and apps
sponsored by Verizon
WHITE PAPER: This white paper teaches you how to assess your existing security policies, giving you advice on potential weaknesses and best practices to strengthen your mobile security. Get better peace of mind with policies that keep data, devices and apps in line no matter where your workforce roams.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Wireless Defense Strategies in the IoT Era
sponsored by Fortinet, Inc.
EBOOK: As IoT blooms, it's introducing new security challenges. Challenges that access layer security strategies can help you combat. Read on to learn about new approaches and choosing secure WLAN solutions.
Posted: 08 Jun 2016 | Published: 01 Jun 2016

Fortinet, Inc.

Wireless Security Survey 2016
sponsored by Fortinet, Inc.
WHITE PAPER: 79% of IT pros expect an integrated security architecture to address the challenges of cybersecurity while also enabling secure network access. This survey report provides an overview of the key security challenges and trends faced by enterprise IT decision-makers in an ever-changing, globally networked ecosystem.
Posted: 08 Jun 2016 | Published: 02 May 2016

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement