IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security NetworkReports
 
The Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by LogRhythm, Inc.
WHITE PAPER: This paper outlines how LogRhythm's Security Intelligence Platform maps directly to each of the 20 Critical Security Controls, developed by the SANS Institute to help prioritize the most effective methods and policies to safeguard assets, information, and infrastructure.
Posted: 31 Jul 2014 | Published: 31 Jan 2014

LogRhythm, Inc.

Key Benefits of Secure Mobile Intranet Access
sponsored by Fiberlink
DATA SHEET: Workforce mobility has caused us to change the way we do business.  Today, mobile workers expect to be able to reach corporate resources from anywhere, as if they were in the office.  This data sheet features a solution that mobilizes SharePoint and many other Intranets.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Fiberlink

SDN-Based Open Networking Building Momentum Among IT Decision Makers
sponsored by Dell, Inc.
WHITE PAPER: Two of the most important technologies today are open networking and SDN.  For the past few years, both have gained acceptance in data centers due to their promise of improved IT agaility, flexibility and manageability.
Posted: 02 Sep 2014 | Published: 02 Sep 2014

Dell, Inc.

Mitigating Security & Compliance Risks with EMM
sponsored by BlackBerry
WHITE PAPER: Due to potential threats to enterprise security that come along with workforce mobility, companies are discovering pitfalls from legal, competitive, and productivity standpoints.
Posted: 31 Jul 2014 | Published: 31 May 2014

BlackBerry

5 Tips for Guest BYOD Use
sponsored by North Sydney IT and Cisco
WHITE PAPER: If your midsize company welcomes guests and their mobile devices, read this white paper. Get five tips for guest BYOD use.
Posted: 15 Sep 2014 | Published: 15 Sep 2014

North Sydney IT and Cisco

Evaluación comparativa de eficacia y rendimiento: Sistema de prevención de intrusiones para seguridad de redes GX7800 de IBM
sponsored by IBM
PRODUCT REVIEW: Lea este reportaje para aprender los resultados de las pruebas de eficacia y rendimiento de IBM Security Network Intrusion Prevention System GX7800, además de las características y funcionalidad.
Posted: 02 Aug 2014 | Published: 02 Aug 2014

IBM

WAF or IPS - Why you need more than a Firewall and IPS to protect your applications
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explains the importance of using more than just a firewall and IPS to protect your applications from malicious attacks.
Posted: 11 Sep 2014 | Published: 11 Sep 2014

Fortinet, Inc.

Control Network Security with a New Approach to Malware Defense
sponsored by Hewlett-Packard Company
WHITE PAPER: This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

Hewlett-Packard Company

Network Evolution – July/August 2014
sponsored by SearchNetworking.com
EZINE: Learn how context-aware security makes network security policy smarter -- but only with a solid foundation. We also cover hybrid SDN and programming for network engineers.
Posted: 31 Jul 2014 | Published: 01 Aug 2014

SearchNetworking.com

DNS Deployment: Top Benefits, Challenges, and Concerns
sponsored by F5 Networks
WHITE PAPER: This infographic provides a number of statistics that illustrate the current challenges of deploying an available, secure, high-performance DNS (Domain Name System) infrastructure.
Posted: 28 Jul 2014 | Published: 28 Jul 2014

F5 Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement