IT Management  >   Systems Operations  >   Security  >  

Security Network

RSS Feed   
Security Network Reports
Case Study: Columbia County Sheriff
sponsored by HID Global
CASE STUDY: The Columbia County Sheriff's Office has evolved its approach to protecting information by verifying the identities of everyone who accesses the network or the agency's computers. In this case study, learn how they turned to HID Global to help them comply with the FBI's security policy, increase overall security and improve user experience.
Posted: 10 Apr 2019 | Published: 19 Jan 2018

HID Global

Transforming Cloud Connectivity & Security in Distributed Networks
sponsored by Forcepoint
VIDEO: In this webcast, learn how Forcepoint branch security can enable highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.
Posted: 29 May 2019 | Premiered: 29 May 2019


Leading Logistics Provider Supercharges Network with Secure SD-WAN
sponsored by Barracuda
CASE STUDY: Uncover how logistics giant H.Essers streamlined their WAN infrastructure to include ultimately provide seamless and secure connectivity to all of their remote and branch environments –safeguarding the data of their customers in the process.
Posted: 18 Apr 2019 | Published: 18 Apr 2019


DDoS Attack Mitigation in the Cloud Age
sponsored by Nokia
WHITE PAPER: DDoS attack methods are constantly evolving, and network operators must similarly adapt and evolve their arsenal of defensive measures to keep their customers, content and infrastructure safe. Find out how Nokia can help you do that in this white paper.
Posted: 14 May 2019 | Published: 14 May 2019


High Performance Direct Internet Access for Office 365 and the Public Cloud with Secure SD-WAN
sponsored by Barracuda
WHITE PAPER: Download this white paper to learn why firewalls are a critical piece of application delivery and performance – and how the right firewall can help maintain seamless business and consumer broadband connections, even during huge traffic spikes.
Posted: 19 Apr 2019 | Published: 19 Apr 2019


Safeguard your devices against ransomware with Log360
sponsored by ManageEngine
WHITE PAPER: Network attack mechanisms continue to evolve on a daily basis. Of the network attacks that aim to steal or compromise data in some way, ransomware attacks have gained significance in recent times. In this white paper, learn how to properly implement and utilize SIEM as a defense against ransomware.
Posted: 10 May 2019 | Published: 10 May 2019


Why CASB Alone Isn't Enough
sponsored by Open Systems Technologies
WHITE PAPER: Download this white paper to learn about the benefits of a complete web protection platform and why a CASB is no longer enough.
Posted: 13 May 2019 | Published: 13 May 2019

Digital Transformation Executive Report
sponsored by Dell SecureWorks
WHITE PAPER: Businesses are more dependent on technology than ever before. While digital transformation brings about opportunity, it also introduces large amounts of risk. In this white paper, learn how organizations can create a decentralized security partnership approach between security, IT and citizen developers.
Posted: 23 May 2019 | Published: 23 May 2019

Dell SecureWorks

Do You See What DDI Sees?
sponsored by Infoblox
RESOURCE: How well you defend yourself can depend on how well your security teams can see events as they occur across your network. Unfortunately, some products lack visibility into some areas of your network. In this report, learn about DDI and how it can provide the essential data security teams need to remediate attacks faster and more efficiently.
Posted: 01 May 2019 | Published: 01 May 2019


Protect Your Organization From Unwanted Cryptomining
sponsored by Cisco Umbrella
WHITE PAPER: Malicious cryptomining is a browser or software-based threat that enables bad actors to secretly use a business' computing power to mine digital currency. Bad actors are drawn to cryptomining because it's an easy and anonymous way for them to generate cash. In this white paper, learn how to protect your organization from cryptomining.
Posted: 02 May 2019 | Published: 02 May 2019

Cisco Umbrella

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement