Network Security Research
-
How to Implement Network Microsegmentation
Sponsored by: NTT Com Security (UK) LtdDiscover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.
-
The Adaptive Security Platform: Secure the Modern Data Center
Sponsored by: IllumioIn this e-guide, uncover an interview with two security gurus from Illumio, a winner of our Network Innovation Award, on their Adaptive Security Platform (ASP). Learn the basics about this platform, and gain insights on how you can reduce complexity and develop a discerning data center security posture.
-
Mobile Data Security Threats: Hype vs. Reality
Sponsored by: LookoutAs threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
-
Cyberhunting: A Critical Component of Enterprise Security
Sponsored by: InfocyteCyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.
-
DLP Tools Essential to Data Protection Strategy
Sponsored by: Intel SecurityNetwork-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
-
Mastering the Top Enterprise Mobility Challenges
Sponsored by: MicrosoftMobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
-
Six Steps to Buying Data Loss Prevention Products
Sponsored by: Intel SecurityData loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
-
Five Critical Rules for Firewall Management: Lessons from the Field
Sponsored by: Dell SecureWorksThis white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
-
Information Security Magazine: Insider Edition
Sponsored by: TechTarget SecurityAttaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.
-
What to Look for in Secure Sockets Layer
Sponsored by: TechTarget SecurityThis Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
-
Is Your Network Too Flat? Prevent Data Breaches with Segmentation
Sponsored by: TechTarget SecurityHow do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.
-
Is It Time to 'Software-Define' Your Network Security?
Sponsored by: TechTarget SecurityThis guide goes beyond most examinations of security in SDN, goes beyond explaining what SDN is and how it might improve network security. Instead, this publication looks in-depth at specific implementations of SDN. Readers will come away with a freshly packed toolkit of SDN-related actionable advice.
-
It's time to tackle IoT security
Sponsored by: RUCKUS NetworksThe forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
-
How can proper BYOD and IoT device onboarding improve
Sponsored by: RUCKUS NetworksThis e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.
-
The IT Security Manager's Guide to Incident Response & Shadow IT
Sponsored by: Cisco UmbrellaThis expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.
-
Threat Intelligence Services: An Introduction
Sponsored by: Cisco UmbrellaImprove your enterprise security with threat intelligence services, as presented in this e-guide, and learn what you can expect when you hire an incident response provider to handle your ongoing crisis.
-
How to Overcome Middleware Security Risks
Sponsored by: Red HatThis expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.
-
The Problem Facing Advanced Threat Defense
Sponsored by: UnitedLexThe biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
-
Organizations Struggle through a Tough Year for SSL Protocols
Sponsored by: Symantec Website SecurityIn this expert e-guide, learn the three primary SSL security issues and the common mistakes organizations make when trying to secure their website. Continue reading and discover how to avoid falling prey to the top SSL/TLS threats.
-
How to Evaluate UCaaS Providers' Security Measures
Sponsored by: Carousel IndustriesThis e-guide discusses ways you can address the security concerns of UCaaS, including multi-tenancy and encryption. It goes on to provide ways you can evaluate the security measures that potential UCaaS vendors are building into their services.
-
SSL Certificate Management: How to Avoid Common Mistakes
Sponsored by: Symantec Website SecurityThis expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.
-
SSL Certificate Management: A Practical Guide
Sponsored by: Symantec Website SecurityThis expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.
-
Encryption's Risks, Benefits, and Roles in SSL Attacks
Sponsored by: Symantec Website SecurityIn this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.
-
Networking Engineering in Extraordinary Places
Sponsored by: TechTarget NetworkingIn this edition of the Network Evolution e-zine, find out how network locations dictate the need to adapt to new and sometimes unusual challenges.
-
Under Attack? 2016 Defenses Escape Compromise
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.