IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security NetworkReports
 
IBM QRadar Security Intelligence: Perception Capture Study
sponsored by IBM
WHITE PAPER: This Ponemon Institute report highlights the capabilities and benefits of one security incident event management (SIEM) solution.
Posted: 05 Mar 2014 | Published: 28 Feb 2014

IBM

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Hewlett-Packard Company

9 Simple (but Critical) Tips for Effective Patch Management
sponsored by Dell, Inc.
WHITE PAPER: This resource offers 9 patch management best practices. Click now to reveal a comprehensive solution that will help you achieve effective patch management without suffering high costs.
Posted: 18 Mar 2014 | Published: 31 Dec 2013

Dell, Inc.

Establishing a Logical Perimeter: The Evolution of Network Security
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: Data intercept requests require organizations to help government agencies collect communication information and content. Learn how you to prepare your network for such requests.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

A New Threat-Centric Security Model for Before, During, and After an Attack
sponsored by Sourcefire
WHITE PAPER: This guide explores a threat-centric security model designed to prevent, detect and remediate any potential cyber-attacks.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Sourcefire

What's Wrong with Traditional Firewalls? (Edu)
sponsored by Dell Software
WHITE PAPER: Did you know that your current firewall may be jeopardizing your network security? Traditional firewalls that only focus on stateful packet inspection and access control rules aren't effective in today's world. This e-book explains where traditional firewalls fall short – and what you can do about it.
Posted: 24 Mar 2014 | Published: 20 Dec 2012

Dell Software

Assessing the Value of Next-Generation Firewalls (Gov)
sponsored by Dell Software
WHITE PAPER: This white paper describes the different types of network-based attacks and how they can affect your bottom line. Click through for recommendations on which security tools can help you prevent these threats.
Posted: 24 Mar 2014 | Published: 24 Mar 2014

Dell Software

Dell Networking Support for Payment Card Industry Data Security Standard
sponsored by Dell, Inc.
WHITE PAPER: This white paper guides you through a series of deployments that help you achieve PCI compliance, thus improving overall network security practices.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

Dell, Inc.

Protecting Control Networks: Key Considerations For Protection
sponsored by Sourcefire
WHITE PAPER: This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement