Software  >   Systems Software  >   Security Software  >  

Network Security Software

RSS Feed   
Network Security Software Reports
1 - 25 of 242 Matches Previous Page  |  Next Page
Why Critical National Infrastructure (CNI) Providers Need CNI-Ready DNS Security
sponsored by Nominet
WHITE PAPER: Download this white paper to explore some of the key challenges facing critical national infrastructure (CNI) providers and how DNS Security can help face down cyber-risk in an increasingly digital world.
Posted: 08 Nov 2018 | Published: 08 Nov 2018

Say Hello to the Software-Defined Perimeter (SDP)
sponsored by Zscaler
ANALYST REPORT: ESG predicts that the challenge of using legacy methods will serve as a catalyst for a new user and application-centric approach to secure internal applications – software-defined perimeter (SDP). In this ESG report, explore the rise of software-defined perimeters and its many use cases.
Posted: 10 Oct 2018 | Published: 31 May 2018


A Song of Intel and Fancy
sponsored by ThreatConnect
RESOURCE: What's your strategy for firewall defense? You don't want to leave your firewall unguarded. Download this case study to see how one organization tracked their infrastructure through SSL certificate use featuring Fancy Bear/APT28/Sofacy.
Posted: 05 Oct 2018 | Published: 16 Mar 2018


3 Zero Trust Security Use Cases and How to Address Them
sponsored by Zscaler
RESOURCE: According to Forrester Research analysts, no user or network should be inherently trusted. Read this resource for 3 zero trust security use cases and how to address them.
Posted: 05 Oct 2018 | Published: 05 Oct 2018


Cloud Transformation Requires New Ways of Thinking
sponsored by Zscaler
WHITE PAPER: Download this white paper to learn about a program that enables you to shift from a hub-and spoke architecture to an agile, direct-to-internet architecture by delivering the entire gateway security stack as a service.
Posted: 02 Oct 2018 | Published: 02 Oct 2018


11 Limitations of Network-Centric Security In The Cloud
sponsored by Lacework
RESOURCE: Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report to learn how you can modernize your network security.
Posted: 24 Sep 2018 | Published: 24 Sep 2018


Helping Noble Group to Secure its Global Network
sponsored by British Telecommunications PLC
CASE STUDY: The Noble Group, a Hong Kong-based global banking company needed to maintain their highest standards of network security. Since their whole business revolved around real-time, online global trading, it was crucial to have a secure and dependable network. Read on to learn about the security services they implemented.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

British Telecommunications PLC

Key Drivers For Network And Security Automation In 2018
sponsored by Indeni
RESEARCH CONTENT: Network automation is a must-have in 2018, but not enough IT professionals have the skills the get the job done, find out how to get them in the attached report.
Posted: 12 Sep 2018 | Published: 12 Sep 2018


Out-Of-Band Network Management System
sponsored by Opengear
CASE STUDY: Banks require reliable systems to improve network uptime and ensure easy, secure access to important and sensitive information. Find out how a Turkish bank employed a strategy to manage and configure their network during downtime using out-of-band technology.
Posted: 06 Sep 2018 | Published: 06 Sep 2018


9 Metadata Network Security Use Cases
sponsored by Gigamon
WHITE PAPER: With some organizations running more than 2,000 unique applications and tools—which create terabytes of log data—finding anomalies can be difficult. Download this white paper to learn how Gigamon's security platform uses metadata from these applications to protect your organization, and explore use cases for metadata in security.
Posted: 05 Sep 2018 | Published: 31 Dec 2016


Defending Your Network from Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Threat actors increasingly look toward cryptomining, the production of virtual currency, as an easy source of income. Learn how to defend your organization from malicious cryptomining with a security portfolio, today.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Cisco Umbrella

School Network and Information Security
sponsored by Cisco Umbrella
WHITE PAPER: Distributed network environments like schools and universities are being asked to support more and more devices – from laptops in classrooms to cellphones roaming the halls – all while maintaining a robust security posture. Find out how you can protect your network and – by extension – use the network to protect your students.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Cisco Umbrella

Threat Landscape Report Q2 2018
sponsored by Fortinet, Inc.
RESEARCH CONTENT: In this report, explore useful insights into the cyberthreat landscape from many perspectives, and top trends for application exploits, malicious software, and botnets.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

Fortinet, Inc.

The Network Leaders' Guide to Secure SD-WAN
sponsored by Fortinet, Inc.
WHITE PAPER: Provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.Find out how you can ensure a secure network within your enterprise with SD-WAN.
Posted: 13 Aug 2018 | Published: 13 Aug 2018

Fortinet, Inc.

Firewall Cleanup Recommendations
sponsored by FireMon
WHITE PAPER: Download this white paper to learn about FireMon, which provides specialized tools and features to clean up firewalls enterprise-wide efficiently and thoroughly.
Posted: 19 Nov 2018 | Published: 19 Nov 2018


Upgrade Your WAN Infrastructure with a Secure SD-WAN
sponsored by Fortinet, Inc.
WHITE PAPER: Download this white paper to learn about SD-WAN that integrates with security capabilities, delivering protection and networking capabilities that improve efficiency without compromising security.
Posted: 15 Oct 2018 | Published: 15 Oct 2018

Fortinet, Inc.

Securing Digital Transformation: Protecting an Evolving Network
sponsored by Fortinet, Inc.
WHITE PAPER: With more networks adopting cloud services, security must scale to meet the changing requirements of modern, high-performance networks. Download this white paper to learn about the evolving security landscape, and the capabilities of Fortinet's comprehensive security approach.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

Fortinet, Inc.

Determining if You've Outgrown Your First-Gen Sandbox
sponsored by Fortinet, Inc.
WHITE PAPER: It's critical to ensure you have a sandbox that can keep up with the increased volume and sophistication of new threats. Read this whitepaper to learn how to choose an effective and efficient sandbox solution.
Posted: 05 Oct 2018 | Published: 05 Oct 2018

Fortinet, Inc.

Is Your WAF Keeping Pace With Today's Threats?
sponsored by F5 Networks
WHITE PAPER: Cyberattackers are starting to target the application layer, which if breached allows attackers to access the interfaces that hosts use to communicate and access information sent over a network. Read this white paper to learn how to choose a web app firewall (WAF) that protects your network.
Posted: 26 Sep 2018 | Published: 26 Sep 2018

F5 Networks

The Hidden ROI of Cloud-Friendly Security
sponsored by F5 Networks
WHITE PAPER: By 2021, cybercrime could cost businesses six trillion dollars annually, representing the greatest transfer of economic wealth in history, illicit or otherwise, according to Cybersecurity Ventures. Read this eBook to learn how you can protect yourself with—and reap the benefits of—cloud-friendly security.
Posted: 21 Sep 2018 | Published: 21 Sep 2018

F5 Networks

4 Considerations for Achieving a Zero Trust Network
sponsored by FireMon
WHITE PAPER: In a Zero Trust network security model, no communication, system, user, machine or packet goes anywhere without validation. But how do you make that happen? Read this white paper to learn about the 4 functions needed to establish a Zero Trust network, and tips for avoiding problems that could cause your strategy to fail.
Posted: 13 Sep 2018 | Published: 13 Sep 2018


Cyxtera AppGate SDP Used By Government Agency To Secure Access
sponsored by Cyxtera
CASE STUDY: Government Agency Uses AppGate SDP to improve IT access across government departments.
Posted: 10 Sep 2018 | Published: 10 Sep 2018


How to Manage Third-Party Access
sponsored by Cyxtera
WHITE PAPER: Find out how companies are finding simple ways to mitigate security risks when allowing third-party access to their systems while maintaining low IT costs.
Posted: 07 Sep 2018 | Published: 07 Sep 2018


Dimension Data Drives Network Visibility to Boost Security
sponsored by Cisco & Dimension Data
VIDEO: Watch this brief video case study to learn about the platform that Dimension Data used to drive visibility into their distributed, multi-cloud networking environment so that they could patch issues faster and resolve threats more efficiently.
Posted: 07 Sep 2018 | Premiered: 29 Jan 2018

Cisco & Dimension Data

Rest Assured Knowing Your Deployment Environment is Protected
sponsored by Dell and Microsoft
WHITE PAPER: This white paper examines the security measures that accompany the Dell Connected Configuration service to make sure your network and critical data stay safe.
Posted: 31 Aug 2018 | Published: 31 Dec 2017

Dell and Microsoft
1 - 25 of 242 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement