IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed   
Network Perimeter Security White Papers (View All Report Types)
Human to Machines: The Shift in Security Strategy with Machine Learning
sponsored by Oracle
WHITE PAPER: Today's IT security strategy must evolve to focus on internal threats and securing what matters like customer data, financial data and business-critical applications. In this white paper, gain valuable insights into how machine learning brings a new level of sophistication to cybersecurity threat prediction, prevention, detection and response.
Posted: 07 Mar 2018 | Published: 07 Mar 2018


DDoS Response Playbook
sponsored by Imperva
WHITE PAPER: DDoS attacks have become a fact of life for any business with a web presence. This guide reveals how to plan and execute a DDoS response plan and outlines pragmatic steps and best practices for choosing and setting up the right mitigation strategy for your organization.
Posted: 15 Mar 2018 | Published: 15 Mar 2018


IP Networking Comparison Guide for the Transformational Enterprise
sponsored by Juniper Networks, Inc.
WHITE PAPER: This IDG Research guide compares IP networking solutions from Juniper, Cisco, Extreme (Brocade), Arista, and HP. Learn about the 4 key areas driving enterprise network priorities, the capabilities necessary to drive digital transformation, and how each vendor stacks up.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Juniper Networks, Inc.

Telecom Providers: Improve your Subscribers' Experience
sponsored by Vitria Technology, Inc.
WHITE PAPER: To help improve customer experience, learn how telecom providers can reduce the time from the start of service incidents to issue resolution by accelerating each phase of the incident lifecycle using an effective analytics strategy.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Vitria Technology, Inc.

The Gorilla Guide to Linux Networking 101
sponsored by Cumulus
WHITE PAPER: In this white paper, gain valuable insights into Linux networking basics so your organization can meet the growing demands of users by connecting their applications and data as reliably, securely and efficiently as possible.
Posted: 21 Feb 2018 | Published: 21 Feb 2018


A Next-Generation Approach to Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Vulnerability scanning is the focal point for most enterprise vulnerability management programs. This white paper uncovers a next-generation approach to vulnerability management and how it can improve the security gaps within networks.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Skybox Security

Big Switch Networks and Dell EMC: Next-generation Data Center Networking
sponsored by Big Switch Networks
WHITE PAPER: Software-defined data center workloads are increasing the cost and complexity of configuring, visualizing and securing the network. In this white paper, discover how to deploy and manage the next-generation software-defined data center.
Posted: 19 Jan 2018 | Published: 30 Jun 2017

Big Switch Networks

The Honeypot Project
sponsored by Armor
WHITE PAPER: As the cloud gains momentum, protecting sensitive data no longer means simply safeguarding on-premises infrastructure. Take a look at this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


Certificate Management: Policy & Automation
sponsored by Entrust, Inc.
WHITE PAPER: PKI is becoming a critical underpinning to help organizations succeed as they roll out new digital business models. This white paper offers best practices for PKI certificate management policy and how organizations can simplify and streamline their implementation process.
Posted: 14 Feb 2018 | Published: 14 Feb 2018

Entrust, Inc.

The Theory Behind Google's Beyond Corp Security Model
sponsored by Duo Security
WHITE PAPER: Google's BeyondCorp security model states no traffic within an enterprise's network is any more trustworthy by default than traffic coming in from the outside. This resource offers insight into advancing enterprise security based on Google's BeyondCorp model.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Duo Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement