IT Management  >   Systems Operations  >   Security  >  

Network Perimeter Security

RSS Feed   
Network Perimeter Security Reports
 
Providing A Seamless Experience For Viewers With Predictable Costs
sponsored by Lumen, AWS Managed Service Provider Partner
CASE STUDY: A leading Slovenian television channel wanted to distribute content quickly and easily to their viewers, and they were in search of a partner to help them make it happen. Examine this case study to learn how Lumen’s CDN helped enable stable, scalable service.
Posted: 05 Feb 2021 | Published: 05 Feb 2021

Lumen, AWS Managed Service Provider Partner

Work from home securely by following these simple tips
sponsored by Zivver
WHITE PAPER: Businesses are still getting used to remote employees, and as such, security concerns are still being raised. But these remote employees can help ease some of these concerns by being more mindful about IT security. Study this article to learn 8 security tips for keeping your work-from-home environment on lockdown.
Posted: 08 Feb 2021 | Published: 03 Feb 2021

Zivver

Building a better relationship with Zero: Why Zero Trust needs a Zero Touch approach
sponsored by BlackBerry
RESOURCE: BlackBerry's Zero Trust model is built on the concept of minimal, or indeed zero, disruption – a framework known as 'Zero Touch'. This means utilizing AI to learn the users' behavior and usage patterns, and only challenging the user when they deviate from the learned model. Access this resource to learn more about Blackberry's Zero Trust model.
Posted: 26 Mar 2021 | Published: 26 Mar 2021

BlackBerry

Partnering To Deliver An Automated Secure Access Service Edge
sponsored by Aruba Networks
DATA SHEET: Cloud migration is changing traffic patterns and driving the need to transform WAN and security architectures. SASE is changing how companies build their networks, and when combined with SD-WAN, applications perform highly and threats are averted. Access this data sheet to learn about Silver Peak’s Unity EdgeConnect SD-WAN with automated SASE.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

Aruba Networks

Ofcom raise over £1.3bn in new 5G spectrum auction
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: After announcing their plans to extend and improve basic 4G connectivity around the country, the UK's mobile operators are celebrating their principal gains in the 5G arena with low-band and mid-band spectrum.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

ComputerWeekly.com

Sase & Ztna
sponsored by VMware
EBOOK: Already, SASE is playing a big role in conversations about how to improve remote security and increase network efficiency. Now, zero-trust network access (ZTNA) can provide a user’s contextual identity to all the different SASE security services, making for a smarter, more secure edge. Download SASE & ZTNA For Dummies to learn more.
Posted: 25 Feb 2021 | Published: 25 Feb 2021

VMware

Pass-the-Hash and Pass-the-Ticket
sponsored by Verizon
WHITE PAPER: Pass-the-hash and its relative, pass-the-ticket, are attack techniques commonly used by adversaries to compromise enterprise servers after some other attack has created a foothold inside the enterprise. Inside this white paper, learn how Verizon Software Defined Perimeter (SDP) uses multi-factor authentication to mitigate these attacks.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

Infoblox Video 3
sponsored by Infoblox
WEBCAST: DDI is the shorthand of DNS, DHCP (Dynamic Host Configuration Protocol) and IPAM (IP Address Management). As enterprise networks expand at the edge and apps move to the cloud, it’s becoming clear that these 3 core network services should be cloud-managed as well. Engage this webcast to get a crash course on BloxOne DDI.
Posted: 16 Feb 2021 | Premiered: Feb 16, 2021

Infoblox

How to Build a Network Architecture Across AWS and Azure
sponsored by Aviatrix Systems
WEBCAST: Businesses in the cloud can’t sell themselves short. They need enterprise-class network visibility and security, especially if they’re looking to multi-cloud in the future. In this webinar to learn how organizations are creating a multi-cloud network and security architecture that meets requirements for scale, performance and automation.
Posted: 29 Jan 2021 | Premiered: Jan 29, 2021

Aviatrix Systems

Can a zero-trust approach fill the security perimeter void?
sponsored by SearchSecurity.com
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences