IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed   
Computer Network Security White Papers (View All Report Types)
 
Secure Cloud Faxing for Highly Regulated Industries
sponsored by j2 Global
WHITE PAPER: In this white paper, learn how you can seamlessly implement a cloud fax model without impacting functionality and security – all while gaining a better understanding of the traits to consider when selecting a cloud fax vendor.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

j2 Global

Deception Technology Comes of Age
sponsored by Illusive Networks
WHITE PAPER: Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Illusive Networks

Big Switch Networks and Dell EMC: Next-generation Data Center Networking
sponsored by Big Switch Networks
WHITE PAPER: Software-defined data center workloads are increasing the cost and complexity of configuring, visualizing and securing the network. In this white paper, discover how to deploy and manage the next-generation software-defined data center.
Posted: 19 Jan 2018 | Published: 30 Jun 2017

Big Switch Networks

Check Point and Silver Peak Securing the Internet for SD-WAN
sponsored by Silver Peak
WHITE PAPER: Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.
Posted: 28 Nov 2017 | Published: 31 Dec 2016

Silver Peak

The Cybersecurity Blueprint
sponsored by Solarwinds MSP
WHITE PAPER: As cybersecurity attacks grow in variety, taking a broad layer approach with clients is crucial. Explore this resource to uncover the 4 pillars of a comprehensive, layered security approach and learn how to provide strong layered security.
Posted: 25 Jan 2018 | Published: 31 Dec 2017

Solarwinds MSP

Ransomware: Defending Against 5 Major Types
sponsored by Commvault
WHITE PAPER: Not all ransomware is alike, so no one-size-fits-all strategy exists for defending against these attacks. Explore 5 major types of ransomware attacks and learn how to defend against them to bolster your network security.
Posted: 09 Aug 2017 | Published: 09 Aug 2017

Commvault

Firewall Best Practices to Block Ransomware
sponsored by Sophos
WHITE PAPER: Recent ransomware attacks like Wannacry and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. This white paper reveals best practices for configuring your firewall and network to protect against ransomware.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos

The 3 Keys to Effective Vendor Risk Management
sponsored by BitSight
WHITE PAPER: Lax cybersecurity practices on the part of one vendor could endanger all companies within an ecosystem. Access this resource to learn how you can stay ahead of cybersecurity threats posed by vendors.
Posted: 24 Jan 2018 | Published: 24 Jan 2018

BitSight

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

9 Reasons to Make the Move to a Cloud Contact Center
sponsored by Five9
WHITE PAPER: Discover the 9 reasons to make the switch to a cloud contact center. Learn how the cloud allows you to reduce hardware costs, speed deployment, enable agents to work remotely, and more.
Posted: 28 Sep 2017 | Published: 28 Sep 2017

Five9
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement