Network Security Research
-
Secure Your Internal Corporate Networks With ABAC
Sponsored by: CryptzoneIn this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
-
Modern Mobility E-zine – January
Sponsored by: TechTarget Mobile ComputingDiscover why many IT departments continue to struggle with compliance in the mobile era and what tools are available to help admins get a better grasp on best practices. Access this e-zine to also get an exclusive, in-depth look at how to ease into EMM in the modern era.
-
Threat Monitoring in Tough Times
Sponsored by: TechTarget SecurityToday's threat environment can be murky, and advanced security monitoring is essential. Access this three-part guide and learn the latest means for rooting out the fast-moving malicious actors that are targeting your enterprise's systems.
-
Resolve to Revitalize Your SIEM Security
Sponsored by: TechTarget SecurityThis expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.
-
Breaking the Cyber Attack Lifecycle
Sponsored by: Palo Alto NetworksThis white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
-
Network Evolution: November Issue
Sponsored by: TechTarget NetworkingThis issue of Network Evolution, examines real SDN use cases and deployment models for mainstream enterprises. Also in this issue, network engineers weigh in on how the growing pressure to improve their fluency in security is affecting their jobs.
-
Information Security Magazine: November Issue
Sponsored by: TechTarget SecurityWhat strategies are companies using to protect data against mobile security threats? In Information Security, we ask CISOs who have been there: What works?
-
Network Evolution: October Issue
Sponsored by: TechTarget NetworkingThis eZine outlines the latest trends in networking today. Read on to dive into monitoring the network to optimize the end-user experience. Hear from network engineers and other IT pros who share their tips and techniques for keeping users happy.
-
Global Threats and an Intelligent Response
Sponsored by: TechTarget SecurityIn today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.
-
The Economics of Defense: Modeling Security Investments Against Risk
Sponsored by: Juniper Networks, Inc.There are a number of factors to take into account when building, or modifying, your cybersecurity strategy – and inside this report, take a look at 5 drivers that influence the costs of cybersecurity.
-
Protecting Data on the Go
Sponsored by: TechTarget SecurityThis guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
-
Network Evolution: Shifting the Focus to SD-WAN
Sponsored by: TechTarget NetworkingIn this exclusive issue of the 'Network Evolution' magazine, explore the promise of SD-WAN, why enterprises are so interested in it and what it means for the future of WAN optimization.
-
The Problem with the Padlock
Sponsored by: TechTarget SecurityTLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.
-
Can New Security Tools Keep Your Network Clean?
Sponsored by: TechTarget SecurityModern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.
-
Buyer's Essentials: What to Look for in an EMM Strategy
Sponsored by: TechTarget SecurityEMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.
-
Fighting Cybercrime in the 21st Century
Sponsored by: TechTarget SecurityStrengthen your security with these expert insights into fighting advanced crimeware.
-
Information Security Magazine – May 2015 Issue
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.
-
The Essential Guide for Threat Intelligence Services: What to Look For
Sponsored by: TechTarget SecurityThis Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.
-
The Bot Threat
Sponsored by: Hewlett Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
-
Resolve to Revitalize Your SIEM Security
Sponsored by: IBMThis expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.
-
The Transformation of Wireless Network Security
Sponsored by: TechTarget SecurityThis expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
-
Putting Network Security Into Context
Sponsored by: TechTarget NetworkingToday's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.
-
Endpoint protection: Whitelisting and Beyond
Sponsored by: TechTarget SecurityApplication whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.
-
Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
Sponsored by: TechTarget SecurityTransitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
-
How SSL and TLS Secure Network Transactions
Sponsored by: Symantec & Blue Coat SystemsThis expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.