IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed   
Security Network Reports
Load Balancing 101: The Role of the Reverse Proxy for Highly Available Applications
sponsored by Radware
WEBCAST: App delivery controllers (ADCs) initially emerged from the evolution of advanced load balancers, but load balancing is still a core and critical function that many businesses require. This webcast acts as a "load balancing 101" and explains how a load balancer can act as a reverse proxy to manage app servers.
Posted: 06 Nov 2018 | Premiered: Oct 31, 2018


A guide to securing cloud platforms
sponsored by IBM
WHITE PAPER: Cloud computing platforms are limiting the effectiveness of the traditional perimeter-based security model. Therefore, data protection and regulatory compliance are the main drivers of cloud security and are inhibitors of adoption. Read this white paper to learn more about how you can evaluate your cloud network provider.
Posted: 19 Oct 2018 | Published: 19 Oct 2018


Secure your Journey to the Cloud: AutoNation Case Study
sponsored by Zscaler
CASE STUDY: Find out how AutoNation, America's largest auto retailer, took a cloud-based approach to Internet security across their locations to unify their defense against advanced threats.
Posted: 02 Oct 2018 | Published: 31 Dec 2017


Transform your Network and your Customer Experience
sponsored by Windstream Communications
WHITE PAPER: Find out if SD-WAN is the right approach for your business when it comes to delivering higher app performance and stronger security. Plus, learn about the SD-WAN Concierge cloud-ready service, designed to deliver networking to branch offices and remote sites via software intelligence.
Posted: 15 Oct 2018 | Published: 31 Aug 2018

Windstream Communications

The Definitive Guide to Secure Remote Access
sponsored by Zscaler
WHITE PAPER: Explore the leading known challenges with traditional VPNs when it comes to securing cloud apps and networks, and discover 4 tenets of digital, cloud-ready remote-access security.
Posted: 08 Oct 2018 | Published: 31 Dec 2017


The Anatomy of the Mirai Botnet
sponsored by Radware
WEBCAST: This webcast provides a breakdown of the Mirai structure, components, and attack vectors. Learn about the modern variants of Mirai so that you can understand the threat and prepare your network's defense against botnets like it.
Posted: 06 Nov 2018 | Premiered: Aug 6, 2018


Troubleshooting VPN Tunnel Connectivity
sponsored by Indeni
RESOURCE: Discover 5 steps to troubleshoot VPN tunnel connectivity and configure a Palo Alto Networks Firewall so you can keep your business and its customers connected, wherever they are.
Posted: 09 Oct 2018 | Published: 09 Oct 2018


Definitive Guide to Software-Defined Perimeter Security
sponsored by Cyxtera
WHITE PAPER: Find out how to take an identity-centric approach to the software-defined network perimeter and explore two use cases for how this approach can help secure AWS resources and dramatically reduce the attack surface.
Posted: 03 Dec 2018 | Published: 31 Dec 2017


How to Simplify Security and Shrink the Attack Surface
sponsored by VMware
WHITE PAPER: Modern applications are dynamic and distributed – and the attack surface keeps growing as a result. To secure your business, you need security integrated into your infrastructure, not bolted-on. Download the e-book to learn how to reduce the attack surface and simplify security.
Posted: 29 Oct 2018 | Published: 31 Aug 2018


A CISO Guide to Modern Security Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: In this guide, learn how implementing a modern security architecture can secure your entire organization, meet the demands of compliance, and proactively manage risk.
Posted: 10 Oct 2018 | Published: 10 Oct 2018

Fortinet, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement