IT Management  >   Systems Operations  >   Security  >  

Perimeter Security

RSS Feed   
Perimeter Security Reports
 
AI-Driven Cyber Crime Puts Network Engineering in the Hot Seat
sponsored by Fortinet, Inc.
WHITE PAPER: Cyber criminals are leveraging AI and agile development techniques to outpace human security analysts and outmaneuver even the newest network defenses. In this white paper, learn different ways to revamp your network security strategy to help keep you protected from an evolving threat landscape.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Fortinet, Inc.

BSE Case Study
sponsored by Forcepoint
CASE STUDY: In an attempt to strengthen its security, BSE underwent a complete revamp of all its cybersecurity systems, including DLP. In this case study, learn about BSE's experience implementing Forcepoint DLP, in order to provide end-to-end coverage across the entire network, endpoint and email.
Posted: 13 May 2019 | Published: 19 Mar 2018

Forcepoint

Key Principles and Strategies for Securing the Enterprise Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

Automating Malware Investigation at One of the World's Leading Investment Firms
sponsored by Splunk Services UK Ltd
CASE STUDY: Blackstone's Incident Response team used to investigate each malware alert as if a compromise has already occurred. Considering the volume of alerts and the potential for inconsistency in any manual process, Blackstone knew there had to be a better way. In this case study, learn about the benefits that Blackstone saw since deploying Splunk Phantom.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

DDoS Attack Mitigation in the Cloud Age
sponsored by Nokia
WHITE PAPER: DDoS attack methods are constantly evolving, and network operators must similarly adapt and evolve their arsenal of defensive measures to keep their customers, content and infrastructure safe. Find out how Nokia can help you do that in this white paper.
Posted: 14 May 2019 | Published: 14 May 2019

Nokia

Enhanced Network Access Control: The Holistic Approach to Network Security
sponsored by Aerohive Networks
WHITE PAPER: Although traditional security systems can protect the network perimeter, they often struggle to properly secure devices and vulnerabilities on the network. That's where Enhanced Network Access Control (ENAC) can help. Learn about ENAC and how using it can help strengthen your network security strategy.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Aerohive Networks

Advanced Threat Prevention Appliance
sponsored by Juniper Networks
WHITE PAPER: Organizations worldwide face security and productivity challenges every day. Additionally, security teams often fail to recognize and act on critical incidents. In this white paper, learn how the Juniper Networks Advanced Threat Prevention Appliance can protect organizations from cyberattacks.
Posted: 17 Apr 2019 | Published: 31 Oct 2018

Juniper Networks

Distributed Denial Of Service
sponsored by Neustar
VIDEO: How can you avoid outages from DDoS attacks? In this short video, learn about SiteProtect NG that offers, quick detection and alerting, integrated intelligence, PCI DSS compliance, and much more.
Posted: 04 Mar 2019 | Premiered: 04 Mar 2019

Neustar

The Benefits of Network Visibility for Industrial Automation
sponsored by Forescout
WHITE PAPER: Industrial assets owners have little to no visibility into existing industrial threats and flaws, and therefore no way to anticipate, analyze and respond to incidents. This whitepaper shows how the use of network monitoring technology in manufacturing networks brings tremendous value to both information technology and operational technology teams.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Forescout

Case Study: New York Cruise Lines & Armor Cloud Security
sponsored by Armor
CASE STUDY: The New York Cruise Lines wanted to ensure they provided guests with online resources. However, with every new web-facing resource, there's an increased risk of a data breach. In this case study, learn how the New York Cruise Lines were able to secure their hybrid cloud infrastructure by implementing Armor's managed security provider.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Armor
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement