Network Security Reports

Endpoint Security IT Decision Center Handbook 1
sponsored by TechTarget Security
EGUIDE: Access this expert handbook to explore why organizations need strong endpoint security today more than ever, and discover how software can balance blocking malicious network threats while also granting users access to sensitive data.
Posted: 22 Nov 2013 | Published: 22 Nov 2013

TechTarget Security

SDN Across the Data Center and the Network: Expert Insight
sponsored by TechTarget Security
EGUIDE: The relationship between data center network fabric and software defined networking (SDN) will become increasingly important as engineers begin using these for manageability in high performance data centers. This expert E-Guide compares SDN and network fabrics roles in the data center and potential strategies for each.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

TechTarget Security

Cisco Any Device: Planning a Productive, Secure and Competitive Future
sponsored by Cisco
WHITE PAPER: Discover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
Posted: 29 Nov 2013 | Published: 31 Aug 2011

Cisco

Compliance Management's Seven Steps to Success
sponsored by Infoblox
WHITE PAPER: Failure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
Posted: 26 Nov 2013 | Published: 31 Jul 2013

Infoblox

Automation: The Future of Network Visibility
sponsored by Ixia
WHITE PAPER: As the trend towards data center automation continues, network monitoring becomes increasingly important when optimizing your network. In this white paper, they will explore the data center automation and its importance to company performance and efficiency.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
sponsored by Ixia
WHITE PAPER: It is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

Ixia

Integrating security with HP TippingPoint
sponsored by HP & Intel®
WHITE PAPER: Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance.
Posted: 22 Nov 2013 | Published: 30 Nov 2012

HP & Intel®

Mobile Security Insider's Edition
sponsored by TechTarget Security
EZINE: This Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
Posted: 18 Nov 2013 | Published: 18 Nov 2013

TechTarget Security

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Strong Authentication: Achieve the Level of Identity Assurance You Need
sponsored by HID Global
WHITE PAPER: In this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

HID Global

Sample Corporate Mobile Device Acceptable Use and Security Policy
sponsored by Wisegate
WHITE PAPER: In this exclusive white paper, gain insight on how senior-level IT security professionals have approached the bring-your-own-device (BYOD) trend thus far, and which strategies have led to success or failure.
Posted: 14 Nov 2013 | Published: 14 Nov 2013

Wisegate

Making the Most of BYOD Opportunities
sponsored by Dell and VMware
WHITE PAPER: Access this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity.
Posted: 11 Nov 2013 | Published: 30 Apr 2013

Dell and VMware

Optimal Visibility for Your Network: Expert Insight
sponsored by Gigamon
EGUIDE: Learn about the security visibility on network traffic capture systems available today and how to take full advantage of its benefits.
Posted: 29 Oct 2013 | Published: 29 Oct 2013

Gigamon

The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
sponsored by Symantec Corporation
EGUIDE: SearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
Posted: 17 Oct 2013 | Published: 17 Oct 2013

Symantec Corporation

Endpoint Security: Anti-Virus Alone is Not Enough
sponsored by Lumension
ANALYST REPORT: Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Lumension

What is an Application Delivery Controller (ADC)?
sponsored by Citrix Systems, Inc.
WHITE PAPER: This white paper details how application delivery controllers can help ensure the performance of your applications.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

Citrix Systems, Inc.

Malicious Mobile Apps
sponsored by OpenText Security Solutions
WHITE PAPER: In this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.
Posted: 15 Oct 2013 | Published: 14 Jun 2013

OpenText Security Solutions

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

The Use Case for Integrated Vulnerability Management CORE Security
sponsored by Core Security Technologies
WHITE PAPER: This white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
Posted: 10 Oct 2013 | Published: 10 Oct 2013

Core Security Technologies

The Azzurri IT Leader Peer-to-Peer Opinion Exchange 2013
sponsored by Azzurri
WHITE PAPER: This resource features an opinion exchange on the trend in mobile device use for business workload, whether it's bring-your-own-device (BYOD), choose-your-own-device (CYOD), or don't-bring-your-own-device (DBYOD), and what this means for data security.
Posted: 09 Oct 2013 | Published: 09 Oct 2013

Azzurri

The Network without Borders
sponsored by TechTarget Networking
EGUIDE: This handbook looks at how to design and manage the new endpoint-driven network and extend secure access to private and public cloud services and virtual applications.
Posted: 08 Oct 2013 | Published: 07 Oct 2013

TechTarget Networking

Enterprise Networks: Four of the Top Trends
sponsored by Azzurri
WHITE PAPER: In this white paper, unveil the top 4 trends in enterprise networking for 2014, and use these as guidelines in your network management planning for next year.
Posted: 07 Oct 2013 | Published: 07 Oct 2013

Azzurri

Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website
sponsored by GeoTrust, Inc.
WHITE PAPER: This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more.
Posted: 30 Sep 2013 | Published: 31 Dec 2011

GeoTrust, Inc.

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Reducing Your Patch Cycle to Less Than 5 Days
sponsored by Tenable
WEBCAST: This informative webcast explores the challenges of vulnerability management and creative solutions to help you fully leverage your vulnerability management process and reduce your patch cycle.
Posted: 27 Sep 2013 | Premiered: Sep 3, 2013

Tenable