Network Security Research
-
Why, and how, to merge your SD-WAN and security strategies
Sponsored by: TechTarget NetworkingSD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.
-
Remote Work Cybersecurity: Best Practices & Trends
Sponsored by: KasperskyThe COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
-
Kaspersky Lab’s COVID-19 Relief Initiatives
Sponsored by: KasperskyAmid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
-
Security Access Controls Over Identities Must Be Priority
Sponsored by: TechTarget SecurityNo company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
-
Maintaining network infrastructure in a pandemic and beyond
Sponsored by: TechTarget NetworkingAs workers join video conferences and access corporate resources remotely, they're likely unaware of the network infrastructure that supports those actions -- until something doesn't work. In this e-guide, learn how to prepare your network for an increased number of remote workers.
-
How Application Delivery Controllers Have Evolved to Meet New Demands
Sponsored by: CitrixADCs are physical or virtual devices deployed between applications and users. They intercept session traffic between applications and users and provide a range of functions designed to optimize the end-user application experience. Download this e-guide to learn more about ADCs are how they evolved over the years to meet new demands.
-
Identifying Network Security Vulnerabilities
Sponsored by: Crosskey Cyber SecurityIT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
-
What secure email gateways can do for your enterprise
Sponsored by: TechTarget SecurityIt is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
-
A Guide to SIEM Platforms, Benefits and Features
Sponsored by: TechTarget SecuritySIEM systems enable organizations to centralize indecent response, detection and handling, as well as data logging for compliance. This e-guide is a collection of resources highlighting SIEM benefits, criteria and tools. Read on to evaluate which SIEM system is right for you.
-
SIEM Tools, Future Tech and How to Prepare for What's Ahead
Sponsored by: Sumo Logic AWSWhile security tech is evolving, so are the threats. Current IT staffs are feeling overwhelmed and some experts believe AI is the answer. Gartner, however, claims that AI will never be perfect, and SIEM will always need a human touch. In this e-book, look at current SIEM tools, future tech and how to prepare for what’s ahead.
-
A Computer Weekly buyer’s guide to perimeterless network security
Sponsored by: TechTarget ComputerWeekly.comPerimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
-
Assess Secure Web Gateways to Suit Your Network Security Needs
Sponsored by: TechTarget SecuritySecure web gateways are complex security controls that sit between the user and the internet to protect the organization from advanced web security threats. This buyer’s guide can help simplify the buying process by addressing the key considerations for evaluating a secure web gateway and the features and functionality these products offer.
-
Securing the SD-WAN: The Next Network Challenge
Sponsored by: Cisco UmbrellaHow does adopting SD-WAN affect security? Download this expert guide for tips on securing SD-WAN, and find out why security is an essential part of the migration process.
-
Network Security and the Cloud: The Basics
Sponsored by: BarracudaOrganizations turn to the public cloud for its massive, on-demand compute and storage capabilities. But none of those capabilities matter if there isn't proper networking and security policies to ensure applications run safely and smoothly. In this expert guide, learn methods to properly secure your network as you migrate to the cloud.
-
Cybersecurity strategies: Best-of-breed or integrated security suites?
Sponsored by: TechTarget IT ChannelOver the past decade, the security landscape has changed remarkably, creating challenges for organizations that must determine whether to use point-products or integrated solutions. Read this handbook to better understand this cybersecurity strategy dilemma, and how channel organizations should approach it.
-
Explore the Threat Hunting Process
Sponsored by: TechTarget SecurityThe threat hunting process hinges on an expert's ability to create hypotheses and to hunt for patterns and indicators of compromise in data-driven networks. In this issues of Information Security, explore learn how threat hunting programs can find security holes that machine learning or automated systems fail to detect.
-
2019 Network Security Predictions: Top Trends & Challenges
Sponsored by: TBNG ConsultingRead this expert guide to review predicted networking trends for 2019. Also, learn why network security remains a top challenge and how you can properly manage it.
-
SDN & SD-WAN: Transform Network Infrastructure and Security
Sponsored by: Dimension DataIn this expert e-guide, CIO and principal analyst John Burke of Nemertes Research discusses what key considerations to keep in mind when updating your network infrastructure and security with SD-WAN.
-
Allure of the threat hunter draws companies large and small
Sponsored by: TechTarget SecurityDo you need a threat hunter on your analyst team? Threat hunting allows companies to be proactive, rather than wait for attackers to trigger alarms after they have already infiltrated an organization's systems. Yet not every company is ready to employ threat hunting techniques.
-
User behavior analytics tackles cloud, hybrid environments
Sponsored by: TechTarget SecurityIn this issue of Information Security, explore why organizations are investing in user behavior analytics for on-premises and cloud.
-
Cryptojacking Attacks May Not Challenge Ransomware Dominance
Sponsored by: Cisco UmbrellaCryptojacking attacks are on the rise, but experts are unsure if the threat can overtake ransomware as the cryptomining strategy of choice.Do you think cryptojacking could become more common than ransomware? Industry experts weigh in on the future of cryptomining inside.
-
How to best secure DNS? There's more than one approach
Sponsored by: TechTarget SecurityThe passive DNS approach may be the way to secure DNS in the enterprise. The method employs networks of sensors to monitor the DNS ecosystem for suspicious domain name activity and stop it cold. Learn how passive DNS works in the endless cat-and-mouse IT security game.
-
How SD-WAN is Changing Network Security
Sponsored by: Cato NetworksIn this expert e-guide, we explore how network security has to change in order to keep up with the evolution of SD-WAN. Find out how some vendors are differentiating their SD-WAN platforms with native security, and read up on how SD-WAN is reshaping the network connectivity landscape.
-
Effective end-user management helps fuel productivity
Sponsored by: TechTarget Enterprise DesktopDownload this three-part handbook on end user management to take a look at the double-edged nature of many technologies aimed to improve productivity, the potential of companion apps and more.
-
How to Make the Most of your Detection and Response
Sponsored by: Respond SoftwareLearn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.