Network Security Research
-
How to best secure DNS? There's more than one approach
Sponsored by: TechTarget SecurityThe passive DNS approach may be the way to secure DNS in the enterprise. The method employs networks of sensors to monitor the DNS ecosystem for suspicious domain name activity and stop it cold. Learn how passive DNS works in the endless cat-and-mouse IT security game.
-
How SD-WAN is Changing Network Security
Sponsored by: Cato NetworksIn this expert e-guide, we explore how network security has to change in order to keep up with the evolution of SD-WAN. Find out how some vendors are differentiating their SD-WAN platforms with native security, and read up on how SD-WAN is reshaping the network connectivity landscape.
-
Effective end-user management helps fuel productivity
Sponsored by: TechTarget Enterprise DesktopDownload this three-part handbook on end user management to take a look at the double-edged nature of many technologies aimed to improve productivity, the potential of companion apps and more.
-
How to Make the Most of your Detection and Response
Sponsored by: Respond SoftwareLearn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.
-
The Evolution of ADC
Sponsored by: CitrixExplore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.
-
Cyber-Risk Strategies and Models for a Post-Perimeter Age
Sponsored by: TechTarget SecurityIn our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.
-
What SD-WAN Means for Today's Businesses
Sponsored by: VerizonLearn from Lee Doyle, Principal Analyst at Doyle Research, about how a mature SD-WAN market can bring distributed networks up to speed with simplicity and automation. Then, find out how to exactly tailor SD-WAN for your business needs.
-
Network Evolution: Network Pros Get Smart(er) with Analytics
Sponsored by: TechTarget NetworkingIn this issue of Network Evolution e-zine, learn why enterprises are turning to big data network analytics tools that leverage machine learning and AI to create meaningful, actionable information that can help enhance network performance.
-
Optimizing Endpoint Security for the Enterprise
Sponsored by: ConvergeOneGiven the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.
-
The New Age of Microsegmentation
Sponsored by: IllumioWhy has a microsegmentation security strategy become so popular? In this e-guide, experts Andrew Froehlich and Dave Shackleford discuss the benefits and drawbacks of microsegmentation and how to get the most of your security approach.
-
Endpoint Protection & Device Management
Sponsored by: SeqriteThe endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.
-
How to Successfully Move your UCC Strategy to the Cloud
Sponsored by: CiscoThis e-guide explores unified communication and collaboration (UCC) challenges IT networking pros need to overcome, as well as how to craft cloud UC strategies to aid in overcoming these challenges.
-
Defense-In-Depth Security: Key to Keeping IT Safe
Sponsored by: TechTarget SecurityThe enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.
-
How SMBs are Changing their Security Tactics
Sponsored by: Booz Allen HamiltonSecurity has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.
-
How SD-WAN Can Benefit Branch Networks
Sponsored by: Hughes Network SystemsGain valuable insights into why organizations are rapidly adopting cloud-based software networking technologies like SD-WAN to meet these next-generation WAN requirements. Then, uncover how you can bring distributed networks up to speed with simplicity and automation.
-
Plug Into the Network of the Future: Hyper-converged Infrastructure, SD-WAN, and Intent-based Networking
Sponsored by: TechTarget NetworkingHyper-converged infrastructure, SD-WAN, and intent-based networking: How all of these combine to create the future of networking technology remains to be seen. In the meantime, network managers continue to find the best ways to manage their expanding networks. Learn more in this issue of Network Evolution e-zine.
-
Buyer's Guide: Cybersecurity
Sponsored by: Palo Alto NetworksKeeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.
-
Firewall Buyer's Guide
Sponsored by: Palo Alto NetworksYour network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
-
Buyers Guide: Network Security Management
Sponsored by: Palo Alto NetworksWhen it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.
-
A New Call for Alignment Between Business Needs and Enterprise Networks
Sponsored by: TechTarget NetworkingIn this issue of Network Evolution e-zine, we learn how more comprehensive IT-business strategic alignment would aid network managers. We focus on 3 key areas: hardware management, UC, and network security.
-
SIEM Analyst Research Bundle
Sponsored by: AT&T CybersecurityNo matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.
-
New Options to Enable Remote Access in the Network
Sponsored by: TechTarget NetworkingThis handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.
-
Guide to Early Application Testing and Understanding Dev and Ops Responsibilities
Sponsored by: IBMExplore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.
-
How to Think like a Hacker to Stop Application Security Threats
Sponsored by: IBMFind out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.
-
How to Secure Mobile Applications in a Private Cloud
Sponsored by: IBMIn this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.