IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed   
Computer Network Security Reports
 
How you can Adopt a Webscale Approach to Networking
sponsored by Nokia
WHITE PAPER: This white paper explores how to execute networking at webscale so that you can position your network to support your business as it grows. Find out what factors enable webscale networking, including SDN and insight-driven automation.
Posted: 31 Oct 2018 | Published: 31 Oct 2018

Nokia

Using SD-WAN to Enhance Your Security Posture
sponsored by Open Systems
RESOURCE CENTER: This custom white paper explores how to create a secure, scalable, highly visible SD-WAN deployment. Learn about the importance of having integrated security in your SD-WAN so that you can resolve vulnerabilities and improve your security posture.
Posted: 13 Nov 2018 | Published: 13 Nov 2018

Open Systems

Allure of the threat hunter draws companies large and small
sponsored by SearchSecurity.com
EZINE: Do you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
Posted: 29 Nov 2018 | Published: 29 Nov 2018

SearchSecurity.com

3 Steps to a Cloud-Ready WAN in 2018
sponsored by Apcela
WEBCAST: State of the wan 2018 and wan security, 3 simple steps to a cloud ready wan: map your apps to the cloud, leverage distributed communications hubs, deploy app aware routing and auto, key considerations for wan and branch office evo, plus sec, edge compute, and auto
Posted: 05 Oct 2018 | Premiered: Apr 25, 2018

Apcela

Enquête : La sécurité du réseau, une priorité pour les entreprises françaises ?
sponsored by TechTarget
RESOURCE: Grâce à votre participation et celles de vos pairs à notre enquête, nous pourrons déterminer les grandes tendances de l'année en matière de sécurité réseau, et ainsi vous proposer toujours plus de contenu adapté à vos besoins.
Posted: 24 Oct 2018 | Published: 24 Oct 2018

TechTarget

The Anatomy of the Mirai Botnet
sponsored by Radware
WEBCAST: This webcast provides a breakdown of the Mirai structure, components, and attack vectors. Learn about the modern variants of Mirai so that you can understand the threat and prepare your network's defense against botnets like it.
Posted: 06 Nov 2018 | Premiered: Aug 6, 2018

Radware

To Survive, Smaller Banking Institutions Need a Strong Network Infrastructure
sponsored by Windstream Communications
RESEARCH CONTENT: Find out how banks are planning to transform their networks to support bandwidth-heavy technologies like cloud apps with SD-WAN infrastructures.
Posted: 15 Oct 2018 | Published: 30 Nov 2017

Windstream Communications

The Definitive Guide to Branch Transformation
sponsored by Zscaler
WHITE PAPER: To overcome cloud networking challenges like reduced visibility and negative user experiences, discover 5 requirements for building your secure cloud strategy.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

Zscaler

The Hidden ROI of Cloud-Friendly Security
sponsored by F5 Networks
WHITE PAPER: By 2021, cybercrime could cost businesses six trillion dollars annually, representing the greatest transfer of economic wealth in history, illicit or otherwise, according to Cybersecurity Ventures. Read this eBook to learn how you can protect yourself with—and reap the benefits of—cloud-friendly security.
Posted: 21 Sep 2018 | Published: 21 Sep 2018

F5 Networks

Advanced Application Threats Require an Advanced WAF
sponsored by F5 Networks
WHITE PAPER: New methods are needed to effectively automate the mitigation of fast-evolving threats. Read this white paper to learn about application security strategies that focus on preventing automated threats, which can help you make operational improvements, and lower operating costs.
Posted: 21 Sep 2018 | Published: 21 Sep 2018

F5 Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement