Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed   
Network Security Software Reports
1 - 25 of 178 Matches Previous Page  |  Next Page
NSS Labs NGFW Report 2018
sponsored by Forcepoint
RESEARCH CONTENT: In this report from NSS Labs, learn about Forcepoint's Next Generation Firewall and how it performed when put to the test.
Posted: 23 May 2019 | Published: 23 May 2019

Forcepoint

Why 56% of Large Businesses are Turning to SDN for Cybersecurity
sponsored by Verizon
RESOURCE: Cybersecurity is a critically important issue for companies. In this resource, learn how software-defined networking (SDN) can enable organizations to virtualize and automate their network operations which, offers businesses a valuable new means to enhance their security.
Posted: 22 May 2019 | Published: 10 Jul 2018

Verizon

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption
sponsored by Corelight
WHITE PAPER: The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.
Posted: 21 May 2019 | Published: 21 May 2019

Corelight

Firewall Cleanup Recommendations
sponsored by FireMon
WHITE PAPER: In this white paper, learn about specialized tools and features that can help clean up enterprise-wide firewalls efficiently and thoroughly.
Posted: 21 May 2019 | Published: 21 May 2019

FireMon

Build a Foundation for Business Growth and Digital Transformation with Secure SD-WAN
sponsored by Open Systems Technologies
RESEARCH CONTENT: This white paper explores why enterprises are transforming their networks today, and how SD-WAN with integrated security can help you reach your networking goals.
Posted: 16 May 2019 | Published: 16 May 2019


Why 1 Company Replaced their VPN with a Software Defined Perimeter
sponsored by Cyxtera
CASE STUDY: Verdant is a consulting, hosting, and software solutions firm. They wanted to replace their VPN and achieve 2 main goals: Get granular control of remote network access across offices and get support for remote employees' work while at customer sites or travelling. Find out how they did that with Cyxtera in this case study.
Posted: 16 May 2019 | Published: 16 May 2019

Cyxtera

DDoS Attack Mitigation in the Cloud Age
sponsored by Nokia
WHITE PAPER: DDoS attack methods are constantly evolving, and network operators must similarly adapt and evolve their arsenal of defensive measures to keep their customers, content and infrastructure safe. Find out how Nokia can help you do that in this white paper.
Posted: 14 May 2019 | Published: 14 May 2019

Nokia

Strategies for Distributed Network Security
sponsored by Forcepoint
RESEARCH CONTENT: Download this report to explore research on how financial institutions are adjusting to the challenges of digital transformation. The findings are based on a survey of senior IT executives in the financial industry on their distributed network security strategy.
Posted: 13 May 2019 | Published: 13 May 2019

Forcepoint

The Future Mode of DDoS Attack Mitigation
sponsored by Nokia
WHITE PAPER: Download this white paper to learn about a new tool designed to protect your network from DDoS attacks no matter what, and find out how leveraging peering routers equipped with Nokia's FP4 routing silicon helps mitigate volumetric attacks.
Posted: 10 May 2019 | Published: 10 May 2019

Nokia

Combine DDoS and TIG Functionality for Insider Threat Protection
sponsored by NetScout Systems, Inc.
ANALYST REPORT: As the architecture of enterprise networks changes, so too do the increasingly sophisticated and persistent techniques of attackers. So how can you protect yourself? Learn about a tool that combines DDoS attack protection and a threat intelligence gateway (TIG) to help protect you from all types of threats.
Posted: 09 May 2019 | Published: 09 May 2019

NetScout Systems, Inc.

Armor Dynamic Threat Blocking (DTB)
sponsored by Armor
WHITE PAPER: Organizations are under constant threat from a barrage of scans and attacks delivered across IP traffic. In this white paper, learn how Armor's Dynamic Threat Block (DTB) is designed to allow security teams to assess and automatically block both incoming and outgoing malicious IP traffic at any layer of their security stack.
Posted: 08 May 2019 | Published: 08 May 2019

Armor

How You Can Establish Intelligently Automated DDoS Protection
sponsored by NetScout Systems, Inc.
RESEARCH CONTENT: In this brief research report, learn about a product that enables you to remove identified DDoS attack traffic from your network without disrupting key network services.
Posted: 08 May 2019 | Published: 08 May 2019

NetScout Systems, Inc.

Assessing the DNS Security Risk
sponsored by Infoblox
RESEARCH CONTENT: Have you ever done an assessment on how secure your DNS infrastructure is? Ponemon Institute recently completed a DNS Security Risk Survey among global organizations to understand how secure they are when it comes to malware and data exfiltration that uses DNS. Download the research report to review their findings.
Posted: 02 May 2019 | Published: 02 May 2019

Infoblox

What is Lurking on Your Network
sponsored by Infoblox
WHITE PAPER: The huge number of shadow personal devices and IoT devices on enterprise networks presents a massive challenge to IT teams—and security professionals in particular. Find out how you can protect your network and devices from common attacks in this white paper.
Posted: 02 May 2019 | Published: 02 May 2019

Infoblox

Networking and Security: Bury the Hatchet in the Cloud
sponsored by Cisco Umbrella
WEBCAST: In this webinar, learn why joining forces with your networking manager may be the best thing for your security team and cloud migration.
Posted: 02 May 2019 | Premiered: May 2, 2019

Cisco Umbrella

How 1 Company Unified Security Management for Wired and Wireless Networks
sponsored by Aruba Networks
CASE STUDY: Daman is a leading specialist health insurer in Abu Dhabi, and was looking for a Network Access Control (NAC) solution to help them comply with a new electronic governmental standard for information security. Learn why Daman chose Aruba and the benefits they've experienced in this case study.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Aruba Networks

Security at the Speed of DevOps
sponsored by Cyxtera
WEBCAST: What if there was a way to connect DevOps workloads without the need for manual intervention—ultimately simplifying security infrastructure? Find out how you can do that with Cyxtera's software-defined perimeter (SDP) in this webinar.
Posted: 30 Apr 2019 | Premiered: Apr 30, 2019

Cyxtera

Juniper Connected Security: Dynamic, Adaptive Multi-cloud Security
sponsored by Juniper Networks
WHITE PAPER: Download this white paper to learn about Juniper Networks' Connected Security framework—which uses dynamic access groups and a unified and intuitive metadata-based policy model that can be ported across clouds—to give security admins complete command and control over their multi-cloud deployments.
Posted: 19 Apr 2019 | Published: 19 Apr 2019

Juniper Networks

Cloud-Managed Network Access Control (NAC) for Dummies
sponsored by Aerohive Networks
WHITE PAPER: Read Cloud-Managed Network Access Control (NAC) for Dummies to learn about the key aspects of NAC within enterprise IT networks, and how they can help you secures all devices on the network — wireless and wired — including corporate, BYOD, guest, and IoT devices.
Posted: 10 Apr 2019 | Published: 10 Apr 2019

Aerohive Networks

The Vulnerable Network: How Enhanced Network Access Control Can Help
sponsored by Aerohive Networks
WEBCAST: In this webinar, learn about Secure Access Management (SAM) and how it can help IT organizations address the core issues of device visibility, control and security that are the root cause of most risks and vulnerabilities on the network.
Posted: 10 Apr 2019 | Premiered: Apr 10, 2019

Aerohive Networks

Enhanced Network Access Control: The Holistic Approach to Network Security
sponsored by Aerohive Networks
WHITE PAPER: Although traditional security systems can protect the network perimeter, they often struggle to properly secure devices and vulnerabilities on the network. That's where Enhanced Network Access Control (ENAC) can help. Learn about ENAC and how using it can help strengthen your network security strategy.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Aerohive Networks

IoT Readiness: 5 Network and Security Necessities
sponsored by MASERGY
WHITE PAPER: In this white paper, learn about the 5 networking and security features that can help ensure your infrastructure is ready for IoT.
Posted: 08 Apr 2019 | Published: 08 Apr 2019

MASERGY

Get Secure Access Across Hybrid Environments
sponsored by Cyxtera
CASE STUDY: In this blog post, learn why Verdant Services selected Cyxtera AppGate SDP as a VPN replacement for securing access across their hybrid environments and implementing a Zero-Trust model.
Posted: 05 Apr 2019 | Published: 05 Apr 2019

Cyxtera

Drive Security Intelligence With Splunk
sponsored by Splunk Services UK Ltd
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk Services UK Ltd

Guide to Understanding SD-WAN: Security Options in Different Networking Architectures
sponsored by Apcela
WHITE PAPER: As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Apcela
1 - 25 of 178 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement