IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Top 6 Reasons to Choose DNA
sponsored by Cisco Systems, Inc.
RESOURCE: This resource explores the top 6 reasons to consider an intent-based networking provider like Cisco's Digital Network Architecture to help deliver added security protection and automation of your network.
Posted: 20 Sep 2017 | Published: 20 Sep 2017

Cisco Systems, Inc.

Top 5 Security Challenges Brought on by Mobile and Cloud
sponsored by Entrust, Inc.
WEBCAST: ½ of CEOs expect their industries to be unrecognizably transformed by digital transformation, mobile and cloud. This webcast delves into the top 5 security challenges presented by the changing security perimeter, such as disruption as the new normal, network and business security imperatives, identity management evolution, and more.
Posted: 09 Oct 2017 | Premiered: Sep 27, 2017

Entrust, Inc.

The Total Economic Impact of Security-as-a-Service: Alert Logic
sponsored by Alert Logic
RESEARCH CONTENT: This Forrester Consulting report examines the ROI for organizations that used Alert Logic services for cloud security.
Posted: 11 Sep 2017 | Published: 31 Jul 2017

Alert Logic

8 Benefits of SSL/TLS Automation
sponsored by Symantec
RESOURCE: In this resource, discover the 8 benefits of SSL/TLS automation to better manage certificate renewals and installations.
Posted: 06 Oct 2017 | Published: 06 Oct 2017

Symantec

When it Comes to Optimizing Mid-Market Enterprise Networks, One Size Does Not Fit All
sponsored by Windstream Communications
RESOURCE: This resource stresses the key considerations to make when you are choosing a SD-WAN provider for your enterprise network.
Posted: 25 Sep 2017 | Published: 25 Aug 2017

Windstream Communications

How Cloud Faxing Protects Confidential Customer Information
sponsored by J2 Cloud Services
RESOURCE: In this resource, recognize the risks associated with traditional faxing and learn how cloud faxing can help prevent big data breaches.
Posted: 13 Sep 2017 | Published: 23 Dec 2016

J2 Cloud Services

The Authoritative Guide to DNS Terminology
sponsored by Oracle + Dyn
EBOOK: Learn the common technology terms surrounding DNS infrastructure and commonly used acronyms by cloud-based Internet performance and DNS providers to help you stay-in-the-know and keep pace with your IT peers.
Posted: 26 Sep 2017 | Published: 26 Sep 2017

Oracle + Dyn

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

The Top 10 Reasons Companies Continue to Fax in 2017
sponsored by J2 Cloud Services
RESOURCE: In this resource, IT professionals share the top 10 reasons why fax continues to grow and how implementing a cloud fax model allows you to send/receive secure communications with the ease of use of a desktop email.
Posted: 14 Sep 2017 | Published: 19 May 2017

J2 Cloud Services

How Apache Software Foundation Streamlined Code-Signing and Managed SSL Certificates
sponsored by Symantec
CASE STUDY: In this case study, discover how the Apache Software Foundation was able to streamline cloud-based code-signing for 350 products and 4,000 developers and more effectively manage SSL certificates for its servers.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Symantec
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement