Standards  >   Network Protocols  >   Network Authentication Protocols  >  

CHAP

RSS Feed   
CHAP Reports
 
Understanding Network TAPs
sponsored by Gigamon
WHITE PAPER: Network security depends not only on common communication protocols but also on the ability to decipher what’s actually in those packets. There’s a simple solution to this that provides visibility into networked traffic: network TAPs. Read the white paper to gain a full understanding of why TAPs are the most effective way to copy network traffic.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

Gigamon

WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

TOGAF® and SABSA® Integration
sponsored by ComputerWeekly.com
IT BRIEFING: This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology.
Posted: 05 Jan 2012 | Published: 11 Oct 2011

ComputerWeekly.com

Replacing FTP Scripts with Managed File Transfer
sponsored by Help/Systems
WEBCAST: Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.
Posted: 12 Feb 2020 | Premiered: Feb 12, 2020

Help/Systems

Shortest Path Bridging for Mission-Critical Video Surveillance Networks
sponsored by ALE USA
WHITE PAPER: Research shows that when things go wrong in a surveillance situation, 75% of the time the failures are attributed to network related issues. In this white paper, learn how and why Shortest Path Bridging (SPB) for video deployments can help ensure consistent quality of video especially when there are network failures.
Posted: 08 May 2020 | Published: 08 May 2020

ALE USA

E-Guide: Prioritizing Application Security Concerns
sponsored by SearchSecurity.com
EGUIDE: Application security has significantly grown and developed in sophistication over the past few years, but so have the threats that seek to wreak havoc on your software. Read this expert e-guide to learn best practices on how to ensure your applications are protected with the highest level of security possible.
Posted: 02 May 2012 | Published: 02 May 2012

SearchSecurity.com

6 Reasons to Expand Network Visibility
sponsored by AppNeta
RESOURCE: In a world where enterprise connectivity is more critical to business success than ever before, you need easy and efficient access to usage data. In this infographic, find out how you can expand upon the capabilities of NetFlow – a protocol developed for monitoring traffic – so that you can create even more comprehensive performance monitoring.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

AppNeta

SOA Reference Architecture
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Download the Open Group Service-Oriented Architecture reference architecture.
Posted: 17 Jan 2012 | Published: 17 Jan 2012

ComputerWeekly.com

What Enterprises Should Do About IPv6 in 2011
sponsored by Cisco Systems, Inc.
WHITE PAPER: The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.
Posted: 26 Jan 2011 | Published: 26 Jan 2011

Cisco Systems, Inc.

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info