IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security NetworkReports
 
Establishing a Logical Perimeter: The Evolution of Network Security
sponsored by Palo Alto Networks
WHITE PAPER: This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Palo Alto Networks

Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER: Gain an understanding of how monitoring switch automation fits your organization, and discover how different security tools can help boost your compliance initiatives.
Posted: 28 Feb 2014 | Published: 30 Nov 2013

Ixia

Networking Monitoring Best Practices: Setting A Network Performance Baseline
sponsored by Ixia
EGUIDE: Explore the necessities for a network performance baseline, potential challenges and how to overcome them with the tips and advice in this e-guide.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Ixia

Secure Network Access for Personal Mobile Devices
sponsored by Cisco
WHITE PAPER: This resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
Posted: 31 Mar 2014 | Published: 30 Sep 2012

Cisco

Reassessing DDoS - Lessons Learned
sponsored by Neustar®
PODCAST: This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Neustar®

Next Generation Network Security Guide
sponsored by TechTarget
RESOURCE: Mobile devices are exploding in enterprises everywhere. Unfortunately, managing this dynamic world of communication is complex and daunting. This guide showcases how to deploy network security devices and how to avoid deployment failures.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

TechTarget

Retail Cyber Crime
sponsored by LogRhythm, Inc.
WHITE PAPER: This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

LogRhythm, Inc.

Heartland Payment Systems: Neustar UltraDNS Case Study
sponsored by Neustar®
CASE STUDY: This informative case study discusses how a financial transaction service organization was able to utilize a security tool to virtually eliminate downtime through 24/7 monitoring and DDoS protection.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Neustar®

Evaluating Cost Of A DDoS Attack
sponsored by Dyn
WHITE PAPER: This brief whitepaper evaluates the costs of DDoS attacks and explores what current organizations are doing to prevent them.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Dyn

Transcript: Network Visibility: Thinking Outside the Box
sponsored by Ixia
PRESENTATION TRANSCRIPT: Explore how virtualization can challenge network monitoring, and discover a scalable solution that will help improve visibility for effective, scalable, secure network monitoring.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Ixia
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement