IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed   
Computer Network Security Reports
Deception: The Security Strategy That Every IT Team Should Be Using
sponsored by Illusive Networks
RESOURCE: In this resource, find out what Illusive Labs learned about cybercriminals and their use of open source intelligence to infiltrate networks and move laterally through a system.
Posted: 12 Sep 2018 | Published: 12 Sep 2018

Illusive Networks

Reduce the Strain of Legacy Apps on Your Budget: Modernizing DNS
sponsored by NS1
WHITE PAPER: When it comes to reducing technical debt from supporting legacy systems, find out why prioritizing underlying infrastructures like DNS that touch so many of your critical apps is a good place to start.
Posted: 27 Jul 2018 | Published: 20 Jun 2018


Securing Growth Through M&A: Using Deception to Protect Dynamic Business Infrastructure
sponsored by Illusive Networks
RESOURCE: Take a look at this resource about cyber risk use cases for deception technology and learn from the example of how security was compromised when Verizon Communications acquired Yahoo! Inc's Internet properties.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Illusive Networks

2018 Networking and Security Trends Report: From Data Centers to Centers of Data
sponsored by VMware
WHITE PAPER: Find out how you can keep up with the demands of a hyper-connected business world with a virtual cloud network that takes an app-centric approach to security.
Posted: 02 Aug 2018 | Published: 30 Jun 2018


Combatting Botnet Traffic with Behavioral Analysis
sponsored by ThreatX
RESOURCE: Find out how to detect and block a number of different distributed attacks with a robust security approach that's designed to grant you visibility into malicious traffic.
Posted: 29 Aug 2018 | Published: 28 Jun 2018


4 Steps to Transforming Network Security
sponsored by VMware
WHITE PAPER: This white paper explores how to transform network security to face modern cyberthreats. Find out how to intelligently align security with the needs of your business by learning about 4 key components of a digital security strategy.
Posted: 31 Jul 2018 | Published: 31 May 2018


Office 365 Survey: Network Challenges in Enterprise Deployments
sponsored by Zscaler
RESOURCE: Find out how to tackle the leading network concerns for Office 365, from bandwidth and latency issues to scaling your firewall, so that you can create a faster, more connected and collaborative user experience for critical cloud apps.
Posted: 09 Aug 2018 | Published: 31 Dec 2017


Resilient Security Architectures: The Paradigm Shift is Here
sponsored by Ixia - Keysight
WHITE PAPER: In the current business climate, it's not a question of if your network will be attacked, but when it will be attacked and how. Learn about a new paradigm shift that's emerging in response to this pressure called security resilience.
Posted: 26 Jul 2018 | Published: 26 Jul 2018

Ixia - Keysight

2018 State of the Firewall
sponsored by FireMon
RESOURCE: Even as network security undergoes expansion, the role of the firewall remains critical. Download this resource to review results from a 2018 FireMon survey.
Posted: 20 Aug 2018 | Published: 20 Aug 2018


What is Machine Learning: The Hype, the Promise, and the Reality
sponsored by Plixer
RESOURCE: Find out how to how to take a targeted approach that applies machine learning to various parts of your network and ongoing network tasks.
Posted: 23 Aug 2018 | Published: 03 Aug 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement