IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed    Add to Google    Add to My Yahoo!
Perimeter Security Reports
 
Manage Remote, Mobile and Campus Access to the Data Center and Cloud from a Single Console
sponsored by Pulse Secure
WHITE PAPER: Access this white paper and discover how you can centrally manage remote, mobile and campus access policies, report on appliance health and endpoint compliance and update appliances by group.
Posted: 11 Jun 2015 | Published: 30 Apr 2015

Pulse Secure

Security, Storage, and Collaboration Gains from Cloud Solutions
sponsored by Box
WHITE PAPER: Access this white paper to learn how Avago Technologies implemented a new cloud file sync and share service, yielding greater business agility, infrastructure cost-savings and simplified management for greater security.
Posted: 21 May 2015 | Published: 31 Jul 2014

Box

VMware NSX The Platform for Network Virtualization
sponsored by VMware
DATA SHEET: Current network and security solutions are rigid, complex and often vendor-specific. Consult this white paper to find out more on how VMware NSX can bring your data center and networking strategies to the next level.
Posted: 22 May 2015 | Published: 22 May 2015

VMware

Today's Top Mobile Security Challenges and Defense Strategies
sponsored by HID
WHITE PAPER: This white paper examines the top mobile security challenges IT is facing today and the most successful defense strategies being used to mitigate threats.
Posted: 26 Jun 2015 | Published: 05 May 2015

HID

10 Things Security Experts Wish End Users Knew
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn the 10 concerns that security experts want end users to know about security at work and at home.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

Global Knowledge

Fake SSL Certificates Enable Variety of Security Threats
sponsored by Blue Coat Systems
EGUIDE: Access this expert guide to learn everything you need to know about the growing vulnerability of digital certificates that underpin trust and security on corporate and consumer network as cyber criminals use man-in-the-middle and DNS attacks.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Blue Coat Systems

Current DDoS Attack and Security Landscape
sponsored by Neustar┬«
RESOURCE: This white paper report outlines the state of DDoS attack trends and the defensive approaches organizations are using. View now to learn why traditional DDoS defenses are allowing hidden malware to sneak through and the new approaches to mitigate DDoS attacks.
Posted: 29 May 2015 | Published: 25 Mar 2015

Neustar®

Securing Your Data Center from Endpoints to the Core
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the features and benefits of a security approach that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

The Answers to Your Mobile App Delivery Issues
sponsored by Citrix
WHITE PAPER: In this white paper, you'll learn why the right network infrastructure is essential to ensuring high quality app delivery across different devices securely, while preparing for future expansion.
Posted: 08 Jun 2015 | Published: 29 May 2015

Citrix

World's first Cloud-enabled G20 Leaders' Summit
sponsored by Dimension Data
CASE STUDY: This case study explains how they deployed a fully consumptive solution for network, including WiFi, security, BYOD management, and a bespoke virtualized desktop to provide a seamless user experience.
Posted: 09 Jun 2015 | Published: 09 Jun 2015

Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement