IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Not Your Father’s IPS: SANS Survey on Network Security Results
sponsored by Hewlett-Packard Company
ANALYST REPORT: Access this analyst report by SANS to uncover how the integration of next-generation IPS with security information and event management (SIEM) tools is changing IT pros approach to security, and how this shift enables improved functions and potential for efficient alert and reporting.
Posted: 01 Feb 2015 | Published: 18 Nov 2013

Hewlett-Packard Company

A Guide to a Multifaceted Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: This white paper can help you develop an innovative approach for catching even the most advanced malware.
Posted: 18 Mar 2015 | Published: 01 Jan 2015

Dell SecureWorks

3 Approaches to Stop DDoS Attacks
sponsored by Radware
WHITE PAPER: This white paper examines the threat landscape of DDoS attacks and details the shortcomings of traditional security approaches. You will uncover how to evaluate and craft a new security strategy to mitigate DDoS attacks based on whether you compute on-premises, in the cloud, or in a hybrid environment. View now to learn more.
Posted: 27 Mar 2015 | Published: 04 Mar 2015

Radware

What is Software Diversification?
sponsored by WhiteCryption
WHITE PAPER: This document describes the concept of software diversification and explains why it should be an integral part of the protection scheme of all software systems run on untrusted hosts. Read on to learn more.
Posted: 25 Feb 2015 | Published: 25 Feb 2015

WhiteCryption

Behavior-based Protection Strategies from the Network to Remote Endpoints.
sponsored by IBM
WHITE PAPER: This white paper looks at behavior-based protection, a comprehensive security system that fights the latest threats.
Posted: 24 Feb 2015 | Published: 31 Oct 2014

IBM

Human Vulnerabilities in Our Current Threat Landscape
sponsored by Global Knowledge
WHITE PAPER: This white paper enables you to educate your employees on security best practices and current human vulnerabilities, helping you to ensure that you're not a part of the many organizations that are breached.
Posted: 10 Feb 2015 | Published: 31 Jan 2015

Global Knowledge

BYOD and the New Way to Work
sponsored by Unify
WHITE PAPER: This exclusive resource is aimed at helping organizations understand the savings opportunities that come with BYOD, and why providing corporate owned devices may be a thing of the past. Read on to learn more.
Posted: 20 Feb 2015 | Published: 20 Feb 2015

Unify

North Korea and the Attack on Sony Pictures Entertainment
sponsored by Hewlett-Packard Company
WHITE PAPER: While the FBI has named North Korea as a culprit in the significant breach on Sony Pictures Entertainment in 2014, it's still possible that the regime didn't act alone. This resource discusses the critical threat intelligence issues that the breach highlights; analyzes North Korea's purported involvement and motivation; and much more.
Posted: 13 Feb 2015 | Published: 19 Dec 2014

Hewlett-Packard Company

It's Not All Black & White: A Practical Method for Blacklisting & Whitelisting
sponsored by Viewfinity
WHITE PAPER: This brief white paper gives a suggestion for how to streamline the whitelisting and blacklisting process, including what to do with the multitude of programs in a gray area between blacklists and whitelists.
Posted: 09 Feb 2015 | Published: 09 Feb 2015

Viewfinity

Enhance Your Malware Protection
sponsored by IBM
WHITE PAPER: This white paper describes a malware protection that can accurately identify even the most advanced malware.
Posted: 06 Mar 2015 | Published: 31 Aug 2014

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement