Methodology of an IAM Introduction
sponsored by Beta Systems
WHITE PAPER:
IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.
Posted: 03 Nov 2020 | Published: 03 Nov 2020
|
|
|
Microsoft Office 365 Security, SASE, and Zero Trust
sponsored by InteliSecure
EBOOK:
Along with the latest security innovation from Microsoft - Office 365 Security - businesses are considering a SASE platform and zero trust architecture to further push their networks to the edge of security. With these developments, IT professionals are asking, ‘Why is this better than what we have in place?’ View this e-book to learn the answer.
Posted: 15 Jul 2020 | Published: 15 Jul 2020
|
|
|
Miercom Labs: Cisco Umbrella Performance Validation Testing
sponsored by Cisco Umbrella
ANALYST REPORT:
Access the results of this evaluation to learn how Cisco Umbrella's cloud-native, SASE optimized security service can boost your platform experience by reducing hop count up to 33%, improve latency and jitter by up to 73%, perform automatic data failover when needed, and more.
Posted: 22 Feb 2021 | Published: 31 Dec 2020
|
|
|
NetMotion: Uncompromised Secure Access
sponsored by NetMotion
VIDEO:
Workers are now working from everywhere, and VPNs are no longer able to provide ample protection in our increasingly mobile world. You need complete visibility into what’s happening on all your devices, no matter where they are. Where can you get it? Take a pause to watch this short video examining NetMotion’s SDP.
Posted: 11 Jan 2021 | Premiered: 11 Jan 2021
|
|
|
Network Management for IP-based Networks
sponsored by Beta Systems
WHITE PAPER:
In this white paper, explore a high-level introduction to network management in the Auconent Business Infrastructure Control Solution (BICS) for office and industrial networks.
Posted: 07 Feb 2020 | Published: 07 Feb 2020
|
|
|
Networking as the enabler of digital transformation
sponsored by Business nbn
WHITE PAPER:
Greater uptake and deployment of cloud-based services, data storage, analytics and other digital elements are driving new ways of working. However, if businesses are without underlying communications infrastructure that can support these new methods, they’re risk falling behind. Read this white paper to learn how to stay ahead of the curve.
Posted: 12 Nov 2020 | Published: 12 Nov 2020
|
|
|
Next Generation Network Management Techniques
sponsored by SearchSecurity.com
EZINE:
The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012
|
|
|
NTT Ltd. and Palo Alto Networks
sponsored by NTT
DATA SHEET:
Today’s businesses have to address a rapid increase in mobile workers, the sudden need for additional branch offices, cloud adoption, data security needs and the growing enforcement of governance, risk and compliance laws. How can they handle all these challenges? View this data sheet to see how NTT and Palo Alto Networks may be able to help.
Posted: 25 Nov 2020 | Published: 25 Nov 2020
|
|
|
Open Trusted Technology Provider Standard (O-TTPS)
sponsored by ComputerWeekly.com
WHITE PAPER:
This standard is aimed at enhancing the integrity of commercial off the shelf ICT products and helping customers to manage sourcing risk.
Posted: 10 Apr 2013 | Published: 10 Apr 2013
|
|
|
Password Security Best Practices for Business
sponsored by Keeper Security Inc
EBOOK:
Getting caught up in sophisticated threat detection using AI, ML user behavior and analytics can cause security professionals to overlook the most important security protocol: password management. Read this e-book to learn how to manage passwords in two steps using practices such as 2FA and policy enforcement.
Posted: 14 Oct 2020 | Published: 14 Oct 2020
|
|
|
PKI Offers Better Identity Security Than Typical MFA Solutions
sponsored by Sectigo
RESOURCE:
Identity is the new perimeter – how can you best protect the identities of your people, devices, and data? MFA can be effective, but it still leaves vulnerabilities that you must account for. View this infographic to learn why public key infrastructure may provide more robust security than typical MFA.
Posted: 09 Oct 2020 | Published: 09 Oct 2020
|
|
|
Pwning Admin Rights To Spread Ransomware: Stories From The Battlefield
sponsored by Remediant
WEBCAST:
Stopping a ransomware attack is a challenge for many organizations, particularly during this era of remote work. Professionals are asking, "What does a ransomware attack look like? Why is it so easy for hackers use credentials to move laterally within a network?" View this webcast to learn how to assess your environment for admin credential risk.
Posted: 28 Aug 2020 | Premiered: Apr 9, 2020
|
|
|
Reliable Access to the Internet is Key to Distance Learning
sponsored by Cradlepoint
DATA SHEET:
An adaptable network must be in place in order for students to continue learning. New approaches to networking are required. Students must be able to reliably access the internet, and teachers must be able to access cloud applications – and it must all be secure. Read this white paper to learn the importance of LTE connectivity during this time.
Posted: 21 Aug 2020 | Published: 21 Aug 2020
|
|
|
Remove Standing Privileges Through a Just-in-Time PAM Approach
sponsored by Remediant
RESOURCE:
Privileged access carries a significant risk, and even with privileged access management (PAM) tools in place, the risk of users with standing privileges remains high. Security professionals engaged in identity management may want to implement a zero standing privileges strategy. Read this Gartner article to learn more about why this is critical.
Posted: 17 Aug 2020 | Published: 06 Sep 2019
|
|
|
Report, Zero Trust: What You Need to Know to Secure Your Data and Networks
sponsored by Gigamon
ANALYST REPORT:
Security teams are doing more with less while facing an increased attack surface as millions transition to a work-from-home model. For those tasked with protecting the network, it’s time to rethink strategy. As Gigamon’s new whitepaper makes clear, adopting Zero Trust is an effective first step toward agility and security.
Posted: 15 Sep 2020 | Published: 31 Mar 2020
|
|
|
SD-WAN Benchmarking Best Practices for QoS
sponsored by Infovista
WHITE PAPER:
Read this white paper to review key capabilities of QoS systems and find out why it's considered a critical component of smart SD-WAN. Also, learn how to properly compare different QoS products prior to implementation to help determine if they can meet your needs.
Posted: 15 Apr 2019 | Published: 15 Apr 2019
|
|
|
Securing the Workplace of the Future
sponsored by Tehama
EBOOK:
By 2027, freelancers will make up most of the workforce, and Gartner estimates 50% of IT services will be outsourced as early as 2020. This presents many opportunities for recruiting, but it also presents security risks. Does your business need to alter its stance? Jump into this e-book to learn how organizations will secure the future workforce.
Posted: 24 Aug 2020 | Published: 27 Nov 2019
|
|
|
Security Without Compromise
sponsored by Remediant
CASE STUDY:
As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020
|
|
|
Networking Basics: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER:
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more.
Posted: 10 Oct 2008 | Published: 10 Oct 2008
|
|
|
One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER:
Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014
|
|
|
OpenFlow and SDN: What's in Store?
sponsored by Big Switch Networks
EGUIDE:
This expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.
Posted: 05 Aug 2013 | Published: 05 Aug 2013
|
|
|
Optiview Network Analyzer -- Free Hardware Trial
sponsored by Fluke Networks
PRODUCT DEMO:
IT departments have constant challenges - staff shortages, tight budgets, but still high expectations for service and support. OptiView analyzer gives you a clear view of your entire enterprise - see into devices, applications, and every connection.
Posted: 04 Feb 2009 | Premiered: 04 Feb 2009
|
|
|
Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
sponsored by Bradford Networks
PRESENTATION TRANSCRIPT:
Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
Posted: 21 Jan 2009 | Published: 21 Jan 2009
|
|
|
Redefining Cloud Network Virtualization with OpenFlow
sponsored by NEC Corporation of America
WHITE PAPER:
NEC ProgrammableFlow takes a first step toward end-to-end network-level virtualization with the potential to make a radical impact on how cloud networks are operated, managed and scaled.
Posted: 29 Sep 2011 | Published: 28 Sep 2011
|
|
|
Router Essentials
sponsored by Global Knowledge
WHITE PAPER:
Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.
Posted: 10 Dec 2008 | Published: 11 Oct 2008
|
|