IT Management  >   Systems Operations  >   Security  >  

Network Level Threats

RSS Feed   
Network Level Threats White Papers (View All Report Types)
 
Security: Creating Trust in a Zero-Trust World
sponsored by OpenText
WHITE PAPER: With more sophisticated hackers on the rise, new technologies and data formats, and a plethora of regulations, how will the enterprise manage all of its data, secure it and ensure that it’s compliant? Download this white paper to learn how a zero-trust security model could lay the foundation for the future of security.
Posted: 10 Dec 2020 | Published: 10 Dec 2020

OpenText

An Introduction to Software-Defined Perimeters (SDP) and Zero Trust Network Access (ZTNA)
sponsored by NetMotion
WHITE PAPER: 87% of organizations were using a VPN in 2020 – 45% of organizations will still be using a VPN by the end of 2023. This is due to the growing popularity of software-defined perimeters (SDP), otherwise known as zero trust network access (ZTNA). In this white paper, discover how SDP/ZTNA works and why it’s the next step in remote access.
Posted: 04 Jan 2021 | Published: 04 Jan 2021

NetMotion

Thales Data Protection for a Multi-Cloud World
sponsored by Arrow & Thales
WHITE PAPER: The biggest challenge for enterprises in the cloud is securely moving data to different clouds and keeping it as safe as it would be on-premise. Also, they must ensure interoperability among cloud environments, all while staying compliant. Download this white paper to learn about a data protection portfolio for multi-cloud architectures.
Posted: 26 Feb 2021 | Published: 31 Dec 2020


Data Protection for Remote Workers
sponsored by HelpSystems
WHITE PAPER: The large-scale move to a remote workforce has put an emphasis on IT’s need to scale security and data protections to home offices, especially at a time when attacks on personal and corporate data continue to rise. What can you do to ensure data security? Examine this solution brief to learn how to fill in the gaps for protecting data.
Posted: 03 Dec 2020 | Published: 31 Jul 2020

HelpSystems

ExtremeCloud™ IQ: Cloud Security and Architecture Overview
sponsored by Extreme Networks
WHITE PAPER: If you’re searching for a cloud-based network management and security solution that strives to provide centralized configuration, orchestration and network monitoring, reporting, alarms and statistics for all cloud-enabled devices, read this comprehensive white paper.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Extreme Networks

Financial Grade APIs Using OAuth and OpenID Connect
sponsored by Curity AB
WHITE PAPER: OAuth and OpenID Connect are international standards that define methods for securing APIs. They carry much weight when it comes to financial compliance. In this white paper, explore various aspects of OAuth and OpenID Connect that can be used to conform to the revised Directive on Payment Services (PSD2) and the GDPR.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Curity AB

5 Key Steps to Securely Connect your Remote Workforce
sponsored by Intrado
WHITE PAPER: The overnight shift from on-site to remote work environments has led to a mass adoption of video collaboration tools and applications. However, many companies took a “connectivity first” approach, exposing their organization to a host of new security risks. Stay safe – read these 5 steps to securely connecting your remote workforce.
Posted: 18 Dec 2020 | Published: 18 Dec 2020

Intrado

Zero-Trust Security for Unmanaged Devices
sponsored by Armis
WHITE PAPER: The zero-trust security model has become a mainstay of security approaches. This white paper explores how to apply this security model to the exploding world of unmanaged devices. From webcams, printers, and building automation systems to industrial control systems and critical medical devices, learn about the evolving applications of zero trust.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

Armis

Oracle Communications and Zoom Strategic Partnership
sponsored by Oracle
WHITE PAPER: As remote working has now become the new norm, enterprises are implementing Zoom for their UC needs to promote enhanced productivity. As such, security and seamless migration are top of mind for enterprise IT administrators. Leverage this white paper to see how Oracle’s Session Border Controller (SBC) is playing a major role in this effort.
Posted: 22 Feb 2021 | Published: 22 Feb 2021

Oracle

Harnessing The Cloud And Data Analytics For Safer, More Secure Elections
sponsored by Carahsoft
WHITE PAPER: The integrity of US elections is pivotal in protecting American democracy. Through digital transformation and technology modernization, state and local governments can bolster their election management and security capabilities. Read this brief for a closer look at how cloud and data analytics can enable safer, more secure elections.
Posted: 25 Jan 2021 | Published: 25 Jan 2021

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info