IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed   
Computer Network Security Reports
 
14 Zero Trust eXtended (ZTX) Ecosystem Providers
sponsored by Okta
ANALYST REPORT: Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.
Posted: 06 Dec 2019 | Published: 29 Oct 2019

Okta

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

Zero Trust Remote Access Platform
sponsored by Banyan Security
PRODUCT OVERVIEW: Many modern enterprises are protected by legacy VPNs which leaves corporate assets, applications, and servers vulnerable to attack. In this brief, learn how Banyan Security’s Zero Trust Remote Access Platform addresses this challenge by shifting the access control from the network perimeter to an individual user or device.
Posted: 05 Dec 2019 | Published: 30 Nov 2019

Banyan Security

Considering Wi-Fi 6
sponsored by Extreme Networks
WHITE PAPER: As enterprises evaluate Wi-Fi 6, it’s important to understand which components are useful and which are hype. In this white paper, discover everything about Wi-Fi 6 which includes Wi-Fi 6 buying tips, Wi-Fi usage and challenges across industries and more.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Extreme Networks

Rethinking Enterprise Data Defense
sponsored by FireMon
EBOOK: Despite heavy investment of time and resources, the number of cybersecurity breaches and incidents continues to increase each year. In this e-book discover how to rethink your enterprise security strategy and explore proactive defense tactics.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

FireMon

Five Major Bot Threats to Holiday E-commerce and How to Stop Them
sponsored by PerimeterX
WHITE PAPER: With the holiday season approaching, it’s essential that online retail companies ensure they are prepared for the cybersecurity threats they face. This white paper highlights 5 major types of attacks companies need to be vigilant of and defensive capabilities for addressing these threats. Read on to make sure your organization is ready.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

PerimeterX

Cloud Networking 2020 Buyer's Guide
sponsored by Extreme Networks
EBOOK: In this 2020 buyer’s guide, explore the characteristics and benefits of cloud-managed networks as a subset of cloud IT services, to help you decide whether cloud networking is right for your organization.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Extreme Networks

Assess Secure Web Gateways to Suit Your Network Security Needs
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: Secure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

SearchSecurity.com

2019 LexisNexis True Cost of Fraud Study
sponsored by LexisNexis® Risk Solutions
WEBCAST: A recent study by LexisNexis Risk Solutions was conducted to help safely navigate the increasing risk of fraud. The research was able to provide a snapshot of current fraud trends and key pain points among financial services and lending companies in the US. Continue to this webcast to uncover the insights from the research.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

LexisNexis® Risk Solutions

How to Simplify Monitoring for Complex Network Devices
sponsored by SolarWinds, Inc.
EBOOK: If you’ve ever been tasked with monitoring and managing Palo Alto Networks firewalls, Cisco ASAs, F5 load balancers or Cisco Nexus devices, you understand this task can be very complex. Download this e-book to explore a number of ways to overcome common challenges of monitoring and managing these devices.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

SolarWinds, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement