Security Devices Research
-
Essential Guide: Securing hybrid IT infrastructure
Sponsored by: TechTarget ComputerWeekly.comIn this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
-
PlateSpin Forge: "Plug in and Protect" Disaster Recovery
Sponsored by: Novell, Inc.PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.
-
HP TippingPoint Provides Next-Generation Network Security
Sponsored by: Hewlett Packard EnterpriseThis informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
-
IBM Collaboration Software for the Apple iPhone and iPad Devices
Sponsored by: IBMCollaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
-
5 Steps to Network Situational Awareness
Sponsored by: Lumeta CorporationThis exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
-
Can a SASE architecture deliver better network performance?
Sponsored by: TechTarget NetworkingSecure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
-
Security Access Controls Over Identities Must Be Priority
Sponsored by: TechTarget SecurityNo company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
-
Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
Sponsored by: FireEyeThis guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
-
Advanced Attacks are Catching On - Here's What you can Do
Sponsored by: KasperskyIn this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
-
Information Security Magazine – July/August 2013
Sponsored by: TechTarget SecurityThis month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.