IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security Network Reports
A Guide to Selecting the Best Authentication and Access Control for Your Enterprise
sponsored by SecureAuth
WHITE PAPER: Discover the 4 critical categories to consider when choosing an advanced authentication and access control strategy.
Posted: 13 Nov 2015 | Published: 28 Oct 2015


Building Next Generation End-to-End IP Communications Architecture
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how to build a next-gen IP communications architecture in your organization, delivering enterprise-grade connectivity, security, and control with a software-driven core. Access this paper to learn how to centralize your UC services and policies.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

Oracle Corporation

Where Cyber Security Fits Into Your Enterprise’s Business Plan
sponsored by Proofpoint, Inc.
EGUIDE: Experts review deception tools, tactics, and operations as a cybersecurity defensive strategy as an alternative to now failing network security approaches.
Posted: 06 Nov 2015 | Published: 29 Oct 2015

Proofpoint, Inc.

Exposing The Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Access this white paper to learn how sandboxing has evolved to fight modern cybercrime and how the technology could secure your business.
Posted: 13 Nov 2015 | Published: 30 Jun 2015

Check Point Software Technologies Ltd.

How to Provide Accelerated Triage for Cisco UC/Jabber
sponsored by NetScout Systems, Inc.
PRODUCT OVERVIEW: In this brief resource, you will learn how to improve your UC service delivery and IT collaboration with a UC server, complete with real-time call quality performance monitoring. Discover how to quickly resolve service quality issues with proactive application and network analyses and service quality alerts.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

NetScout Systems, Inc.

Critical Capabilities for Security Information and Event Management (SIEM)
sponsored by LogRhythm, Inc.
WHITE PAPER: Access this report for insight on aligning IT's needs with three key use cases to choose the best SIEM solution for the organization.
Posted: 12 Nov 2015 | Published: 21 Sep 2015

LogRhythm, Inc.

Stealth Compliance Strategies
sponsored by Unisys
WHITE PAPER: Access this guide to find software-defined security strategies that help government and commercial enterprises prevent highly sensitive data, systems, and intellectual property from being compromised.
Posted: 20 Nov 2015 | Published: 30 Jun 2015


The Total Economic Impact of Comprehensive Security
sponsored by Alert Logic
WHITE PAPER: This white paper analyzes the TEI and ROI for one suite of security solutions and discusses how you can get the most out of your security spending.
Posted: 28 Oct 2015 | Published: 31 Dec 2014

Alert Logic

NH Hotel Group Enhances Network Access and Performance
sponsored by Akamai
CASE STUDY: In this white paper, learn how NH Hotel Group, a multinational hotel, boosted site performance and ensured uptime by bolstering cybersecurity to stop malicious network threats. View now to learn how to improve UX through better network traffic access monitoring and management.
Posted: 18 Nov 2015 | Published: 18 Mar 2015


Best Practices to Enable Clinician Mobility for Patient-Centric Healthcare
sponsored by Citrix
WHITE PAPER: In this white paper, review mHealth best practices to enable secure remote access to PHI and other sensitive data.
Posted: 12 Nov 2015 | Published: 14 Oct 2014

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement