IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Security Analytics Moves to Real-Time Protection
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a security analytics platform that works in real time.
Posted: 07 Apr 2015 | Published: 31 Jul 2014

Blue Coat Systems

Best Practices for Deploying WAN Optimization with Data Replication
sponsored by Silver Peak
WHITE PAPER: In this white paper, you'll learn how to properly deploy WAN optimization in disaster recovery situations.
Posted: 25 Mar 2015 | Published: 25 Mar 2015

Silver Peak

Going Wireless—The Key to Enhancing Patient Care
sponsored by Hewlett-Packard Limited
CASE STUDY: Access this case study to learn how one healthcare facility implemented a wireless network to help improve accessibility for electronic patient records.
Posted: 13 Mar 2015 | Published: 01 Dec 2014

Hewlett-Packard Limited

Securing Your Business Against SSL-Based Attacks
sponsored by Radware
WHITE PAPER: Access this white paper to uncover the four challenges of defending against DoS-based SSL attacks. Read on to learn why current defense solutions are falling short and the triple layer defense strategy that replaces them.
Posted: 31 Mar 2015 | Published: 10 Apr 2013

Radware

Anamoly Detection: Finding Black Swans in Big Data
sponsored by Prelert
WEBCAST: This white paper introduces an anomaly detection system that cuts through big data to find even the subtlest threats.
Posted: 26 Mar 2015 | Premiered: Jan 24, 2015

Prelert

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: In this research report, discover just how complicated SSL/TLS decryption and inspection methodologies have become and learn why you should make encrypted traffic management a near-term priority to address sophisticated SSL cyber threats.
Posted: 15 Apr 2015 | Published: 27 Feb 2015

Blue Coat Systems

ROI Analysis: How to reduce security risks and labor related costs
sponsored by Alert Logic
WHITE PAPER: This economic impact report analyzes one effective risk management solution to give you an accurate assessment of that product's ROI.
Posted: 16 Mar 2015 | Published: 31 Dec 2014

Alert Logic

Solve the Dropbox Problem with Enterprise Content Connectors
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn how to provide a secure IT sanctioned and monitored approach to allowing access to Dropbox.
Posted: 06 Apr 2015 | Published: 20 Mar 2015

Accellion, Inc.

Security and Privacy on the Encrypted Network
sponsored by Blue Coat Systems
WHITE PAPER: This white paper walks you through security policies to ensure that data doesn't leak out through encrypted tunnels. Read on now to learn how to improve your security strategy.
Posted: 07 Apr 2015 | Published: 20 Jan 2015

Blue Coat Systems

Buyer'€™s Criteria for Advanced Malware Protection
sponsored by Cisco Systems, Inc.
WHITE PAPER: This white paper gives you a detailed understanding of what controls need to be in place to stop the strongest attacks.
Posted: 19 Mar 2015 | Published: 31 Dec 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement