IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security Network Reports
 
Q2 2016 State of the Internet Security Report
sponsored by Akamai
WHITE PAPER: Discover how dire the world of DDoS security attacks has become and dig into the details of multi-vector attacks. Learn statistics on each industry that was attacked and get insight on how to best protect your network in the future.
Posted: 29 Sep 2016 | Published: 31 Aug 2016

Akamai

3 Major Challenges to Securing Your Digital Learning Environment
sponsored by Juniper Networks, Inc.
RESOURCE: To keep your data and network safe today, and succeed as a "Cloud-Enabled Enterprise," your organization must overcome three major security challenges. This report outlines these three challenges and how you can address them. Learn how to protect your data as your organization evolves with the cloud.
Posted: 09 Nov 2016 | Published: 30 Sep 2016

Juniper Networks, Inc.

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to secure your wide area network behind a distributed enterprise firewall without sacrificing performance or usability. Learn 5 key requirements to keep all of your dispersed sites secure and keep maintenance costs low.
Posted: 01 Nov 2016 | Published: 31 Oct 2016

Fortinet, Inc.

Mitigate Data Theft and Inappropriate Use in your Network
sponsored by LogRhythm, Inc.
WHITE PAPER: Security teams need tools to help deliver the deep insight necessary to detect a variety of threats. Uncover ways to detect and respond to today's security incidents with tools designed to pinpoint abnormal activity and prevent sensitive data loss.
Posted: 18 Nov 2016 | Published: 18 Nov 2016

LogRhythm, Inc.

Case Study: Gain Real-Time Enterprise-Wide Visibility Into Site Operations
sponsored by Splunk
CASE STUDY: In this case study, learn now Zillow, a massive real-estate website, obtained crystal-clear operational visibility. Discover how it provides self-service abilities to teams to create custom solutions, ensures continuous website uptime, and is continually improving its incident isolation and mitigation abilities.
Posted: 11 Nov 2016 | Published: 11 Nov 2016

Splunk

Protecting the Hybrid Data Center in an Increasingly Virtualized World
sponsored by Juniper Networks, Inc.
WHITE PAPER: Virtualized server workloads have increased in the past year, however most security measures in place today are for purely physical environments. Uncover how to secure your organization's current or future virtualized environments and prevent harmful security tactics.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Juniper Networks, Inc.

Empowering Business Evolution on Open Network Infrastructure
sponsored by Juniper Networks, Inc.
WHITE PAPER: See how you can remove inconveniences that have developed in legacy network and security infrastructure. Inside you will learn about a potential network architecture that embraces openness and simplicity as its main principals.
Posted: 10 Nov 2016 | Published: 31 Aug 2015

Juniper Networks, Inc.

5 Most Dangerous Data Center Security Threats
sponsored by A10 Networks
WHITE PAPER: Gain an in-depth look into the top 5 most dangerous threats to your data center infrastructure. Learn their tricks, behaviors, how devastating they can be and how to make sure your enterprise isn't the next victim.
Posted: 20 Oct 2016 | Published: 20 Oct 2016

A10 Networks

Enabling Tomorrow's Connected Infrastructure for IoT
sponsored by Legrand
WHITE PAPER: With the Internet of Things (IoT) there are new and critical network infrastructure considerations to think about as you prepare for what's ahead. This white paper highlights important considerations for designing your infrastructure to support tomorrow's needs being driven by billions of IoT connected devices.
Posted: 17 Oct 2016 | Published: 31 Aug 2016

Legrand

Ransomware Protection is Futile, but All Hope is Not Lost
sponsored by Dell Software
EGUIDE: Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.
Posted: 26 Sep 2016 | Published: 21 Sep 2016

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement