IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed    Add to Google    Add to My Yahoo!
Security NetworkReports
 
Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This informative whitepaper explores survival tactics in the event of a web attack.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Imperva

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

Network-Powered Application Analytics and Optimization
sponsored by Extreme Networks
WHITE PAPER: This informative guide explores the role of analytics in your network performance management strategy.
Posted: 30 May 2014 | Published: 22 May 2014

Extreme Networks

Next-gen Application Delivery Controllers: An Intelligent Path to Active-Active Clusters
sponsored by Citrix
WHITE PAPER: This informative guide explores the role of these next-generation ADCs and provides insight on their effectiveness.
Posted: 09 May 2014 | Published: 09 May 2014

Citrix

Best Practices for Mobile Application Lifecycle Management
sponsored by IBM
WHITE PAPER: This white paper explores the growing world of mobile application development and highlights the benefits of providing security for mobile applications during the development and deployment stages.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

IBM

The Purview™ Solution–Integration With SIEM
sponsored by Extreme Networks
WHITE PAPER: This whitepaper explores one unique network monitoring and management system that allows for easy integration with your SIEM platform.
Posted: 23 May 2014 | Published: 23 May 2014

Extreme Networks

Fundamentals of the PKI Infrastructure
sponsored by Global Knowledge
WHITE PAPER: This article reviews the basics of PKI, which increases data security through the use of advanced access methods and ensures that the authenticity of the data flow is preserved.
Posted: 11 Jul 2014 | Published: 11 Jul 2014

Global Knowledge

F5 DDoS Protection: Recommended Practices
sponsored by F5 Networks
WHITE PAPER: This exclusive white paper provides strategies used to combat DDoS attacks, particularly defense mechanisms.
Posted: 19 Jun 2014 | Published: 31 Dec 2012

F5 Networks

Cisco Cloud Web Security: Single Interface for Global Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
Posted: 23 Apr 2014 | Published: 28 Feb 2014

Cisco Systems, Inc.

Top 10 Reasons to Strengthen Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
Posted: 05 May 2014 | Published: 31 May 2013

Citrix
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement