Network Authentication Protocols Research
-
SIG - SASE in 15 minutes
Sponsored by: CiscoSecure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.
-
Barracuda CloudGen Access
Sponsored by: BarracudaRemote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.
-
Danger within: email and security awareness training strategies for effective account takeover protection
Sponsored by: MimecastIt’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
-
How to enhance your network for the future
Sponsored by: TechTarget ComputerWeekly.comThe world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
-
Essential Enterprise Mobile Security Controls
Sponsored by: TechTarget SecurityHow will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
-
How IAM Systems Support Compliance
Sponsored by: Beta SystemsMany organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
-
Why, and how, to merge your SD-WAN and security strategies
Sponsored by: TechTarget NetworkingSD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.
-
Automation in the Software-Defined Network
Sponsored by: VMware and Circle ITIn this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.
-
Automation in the Software-Defined Network
Sponsored by: VMware and PresidioIn this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.
-
Explore the Evolving DDoS Threat Landscape
Sponsored by: RadwareDelve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
-
Using DNS Monitoring to Detect Network Breaches
Sponsored by: DynNumerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
-
Just Released: Magic Quadrant for Network Access Control
Sponsored by: Forescout Technologies, Inc.Network access control (NAC) vendors are realizing the necessity of integration with other mobile device management (MDM) and security technologies. When choosing a NAC solution, the ability to integrate is a top concern -- but what else should you consider when evaluating various vendors?
-
Computer Weekly – 19 March 2013: Delivering software development success
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
-
Redefining Cloud Network Virtualization with OpenFlow
Sponsored by: NEC Corporation of AmericaNEC ProgrammableFlow takes a first step toward end-to-end network-level virtualization with the potential to make a radical impact on how cloud networks are operated, managed and scaled.
-
The CIO's Guide to Mobile Security
Sponsored by: BlackBerryLearn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
-
Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization
Sponsored by: Bradford NetworksLearn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.
-
How Does Ping Really Work?
Sponsored by: Global KnowledgeThe purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.
-
Networking Basics: What You Need to Know
Sponsored by: Cisco Systems, Inc.When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more.
-
Best Practices in Authentication and Access Control
Sponsored by: Nevis NetworksRead this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.