IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Case Study: Open Source DNS vs. Bots
sponsored by Nominum, Inc.
CASE STUDY: This case study examines the challenges and consequences that occur when bots lurk in your network.  View now to learn how to remove current bots and block future attacks.
Posted: 12 May 2015 | Published: 25 Mar 2015

Nominum, Inc.

Uncover Threats in SSL Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Access this white paper to see all the features you should have in a SSL inspection platform.
Posted: 28 May 2015 | Published: 31 Dec 2014

A10 Networks

Mobile Device Management for Education
sponsored by IBM
WHITE PAPER: Access this white paper now and learn how mobility and BYOD strategies in all levels of education can make school districts and organizations more cost-effective with the right device and app management solution.
Posted: 29 Apr 2015 | Published: 26 Dec 2014

IBM

Survey Shows Plenty of Room for Improvement in IT Security
sponsored by Hewlett-Packard Company
WHITE PAPER: A new survey from IDG Research Services reveals that most organizations lack confidence in their security defenses. Read this report to learn why, and how you can build security that's worth having confidence in.
Posted: 06 May 2015 | Published: 06 May 2015

Hewlett-Packard Company

Shellshock and Future Vulnerabilities — Buying Precious Time
sponsored by Dell, Inc.
WHITE PAPER: Access this white paper to explore how Shellsock works, how attackers are exploiting network vulnerabilities, and what to do about future vulnerabilities.  View now to learn more.
Posted: 11 May 2015 | Published: 01 Apr 2015

Dell, Inc.

Special Report: Detailed Reviews of 7 IPS Platforms
sponsored by IBM
WHITE PAPER: This report presents detailed reviews of seven IPS platforms to help you decide which one meets your specific needs.
Posted: 26 May 2015 | Published: 29 Dec 2014

IBM

uilding Layered Security to Defend Against Cyber Attacks
sponsored by Absolute Software
WHITE PAPER: In this white paper, discover how you can implement layered security for protection that is significantly stronger than what the average enterprise achieves.
Posted: 01 May 2015 | Published: 30 Nov 2014

Absolute Software

Achieving Enterprise Agility in the Cloud
sponsored by F5 Networks
WHITE PAPER: Download and discover how a combination of solutions can give you the best of both worlds – simplified cloud agility with all of the security, visibility and control that you need.
Posted: 22 May 2015 | Published: 22 May 2015

F5 Networks

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization
sponsored by Mimecast
WHITE PAPER: This white paper presents the timeline of a spear-phishing attack and the common security strategies used that ultimately fail to protect the organization.
Posted: 26 May 2015 | Published: 22 Apr 2015

Mimecast

Network Security: Making the Jump to 100GbE
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores the need for moving network security closer to the core and the need to make the jump from the once-standard 10GbE to 100GbE. View now to learn how to increase East-West visibility to catch masked malware as the data center becomes more virtualized.
Posted: 07 May 2015 | Published: 01 Apr 2015

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement