Network Security Reports

Information Security Essential Guide: The Evolution of Threat Detection and Management
sponsored by TechTarget Security
ESSENTIAL GUIDE: This Information Security Essential Guide outlines the latest threat detection options available, provides a number of best practices for threat prevention, and outlines why your SIEM is a key player in the fight against cybercrime.
Posted: 18 Jul 2013 | Published: 31 May 2013

TechTarget Security

How to tackle cloud, IAM, and digital certificate problems in your organization
sponsored by TechTarget Security
EBOOK: In this in-depth resource, you’ll find extensive amounts of information regarding options for mitigating digital security certificate problems, as well as a breakdown of the challenges posed by IAM in the extended enterprise.
Posted: 11 Jul 2013 | Published: 11 Jul 2013

TechTarget Security

Rethink Defense-In-Depth Security Model For BYOD
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013

TechTarget Security

MPLS Advantages and Disadvantages for WAN Connectivity
sponsored by TechTarget Security
EGUIDE: Read this expert guide to learn the advantages and disadvantages of MPLS for WAN connectivity.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

TechTarget Security

Simplify Network Management with New Secure and Scable Wireless Solutions
sponsored by DellEMC and Intel®
WHITE PAPER: Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.
Posted: 05 Aug 2013 | Published: 31 Jul 2013

DellEMC and Intel®

OpenFlow and SDN: What's in Store?
sponsored by Big Switch Networks
EGUIDE: This expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

Big Switch Networks

Wireless Solutions for Tablets and Smartphones
sponsored by Xirrus
WHITE PAPER: As the popularity of mobility grows, so do the challenges for IT. This resource explores how you can transform mobility from an IT challenge into a business opportunity by designing and managing a better wireless network.
Posted: 02 Aug 2013 | Published: 31 Dec 2011

Xirrus

Strategy guide to business protection for hospitals
sponsored by HP and Intel® Xeon® processors
WHITE PAPER: This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how you can avoid unplanned downtime, ensuring compliance and the highest quality of patient care.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors

Strategy guide to business protection for physician practices
sponsored by HP and Intel® Xeon® processors
WHITE PAPER: This white paper demonstrates how hospitals can manage risk and keep critical IT infrastructure up and running. Read now to learn how HIT leaders can ensure a high availability IT infrastructure that can improve service and protect their business.
Posted: 01 Aug 2013 | Published: 15 Nov 2012

HP and Intel® Xeon® processors

Enterasys Data Center Networking – Connectivity and Topology Design Guide
sponsored by Enterasys
WHITE PAPER: View key concepts that will help you build a data center fabric capable of meeting the needs of both organizations and users both today and in the future. View now to learn more!
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Enterasys

Charité – Becoming an Agile and Efficient Hospital through Virtualization
sponsored by Enterasys
CASE STUDY: This case study reveals the data center networking solution one of Europe's largest university hospitals implemented to help them fully recognize the many benefits of server virtualization.
Posted: 31 Jul 2013 | Published: 28 Jun 2013

Enterasys

Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.
Posted: 31 Jul 2013 | Published: 31 Dec 2012

Xirrus

System z: Making great security even better
sponsored by IBM
WHITE PAPER: Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.
Posted: 30 Jul 2013 | Published: 30 Jul 2013

IBM

Creating the Ultimate Security Platform
sponsored by IBM
WHITE PAPER: This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.
Posted: 19 Jul 2013 | Published: 28 Jun 2013

IBM

Beyond the Next Generation: Putting Advanced Network Security To Work
sponsored by IBM
WHITE PAPER: This informative white paper highlights specific examples of the ways in which these CSN systems put today's more advanced capabilities to work in practical application, rather than catering to one specific capability.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

IBM

AlienVault Unified Security Management: Complete Security Visibility
sponsored by AT&T Cybersecurity
TRIAL SOFTWARE: AlienVault's Unified Security Management™ (USM) products provide a way for organizations with limited security staff and budget to address compliance and threat management needs. Download a free 30-day Trial.
Posted: 17 Jul 2013 | Premiered: 17 Jul 2013

AT&T Cybersecurity

SIEM Demo: Get Complete Security Visibility in an Hour
sponsored by AT&T Cybersecurity
WEBCAST: Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
Posted: 17 Jul 2013 | Premiered: Jun 27, 2013

AT&T Cybersecurity

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

Quick Dirty Dozen PCI Compliance Simplified
sponsored by AT&T Cybersecurity
WEBCAST: Maintaining, verifying, and demonstrating compliance with the PCI-DSS standard is far from a trivial exercise. Attend this webinar to find out how to achieve quick and dirty PCI compliance – without getting your hands dirty.
Posted: 12 Jul 2013 | Premiered: Jul 12, 2013

AT&T Cybersecurity

Practitioner's Guide to Establishing an SOC
sponsored by AT&T Cybersecurity
WHITE PAPER: This white paper provides an overview of how to evaluate the security controls needed to establish a Security Operation Center (SOC), along with what data a SOC needs to quickly detect and respond to a breach.
Posted: 12 Jul 2013 | Published: 09 Apr 2013

AT&T Cybersecurity

5 Backup Features to Ensure Accuracy, Eliminate Complexity and Streamline Auditing
sponsored by APTARE
WHITE PAPER: In this brief resource, you will discover how a storage backup manager eliminates the complexity and manual labor associated with SOX auditing by automatically collecting backup data in real time and storing it in a central web-based repository where administrators and auditors can access, analyze and record the information.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

APTARE

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

IP Office eBook: Communications for your Growing Business
sponsored by Avaya
EBOOK: Organizations of all shapes and sizes are struggling to keep pace with the speed of today's anytime, anywhere business world. This eBook introduces an IP-based unified communications solution that will give you the tools you need to stay competitive.
Posted: 20 Jun 2013 | Published: 31 Mar 2013

Avaya

Guide to Session Border Controllers: The Good, The Bad, The Ugly
sponsored by Sangoma Technologies
EGUIDE: This e-guide from SearchUnifiedCommunications.com lays out the truth about session border controllers (SBC) – the good, the bad, and the ugly. View now to learn why you need SBC, potential obstacles, and how to overcome them.
Posted: 19 Jun 2013 | Published: 19 Jun 2013

Sangoma Technologies