Network Security Research
-
How SSL and TLS Secure Network Transactions
Sponsored by: Symantec & Blue Coat SystemsThis expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
-
Putting Security on Auto-Pilot: What Works, What Doesn't
Sponsored by: TechTarget SecurityThis technical guide examines the pros, cons, and unknowns of automated penetration testing, from how best to use one to the components of your security system that will still require human intervention.
-
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
Sponsored by: IBMFind out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
-
Extending Security Intelligence with Big Data
Sponsored by: IBMLearn how IBM Security Intelligence with Big Data can help organizations gain insights into advanced data threats.
-
Intrusion Detection and Protection: From Business Problem to Technical Solution
Sponsored by: TechTarget SecurityLearn how IDS/IPS help you thwart attacks and mitigate post-attack damage.
-
Data Loss Prevention: RFP Technology Decisions
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Data Loss Prevention: From Business Problem to Technical Solution
Sponsored by: TechTarget SecurityThis expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
-
Countering Cyber-Crime with a Sharp Eye and a Clear Plan
Sponsored by: TechTarget SecurityBigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
-
Securing the Internet of Things
Sponsored by: TechTarget SecurityDiscover the risks related to the IoT and what you can do to mitigate them. Gain an understanding of how traditional threats are altered by the IoT and what steps must be taken now to get a viable and effective IoT policy in place.
-
From Campus LAN to Borderless Networks
Sponsored by: TechTarget NetworkingLearn how context-aware security makes network security policy smarter -- but only with a solid foundation. We also cover hybrid SDN and programming for network engineers.
-
Network Protection and UTM Buyer's Guide
Sponsored by: SophosThis white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
-
Security best practices for file-based data movement— an IT practitioner’s guide
Sponsored by: IBMIn this white paper, discover the best solution used to execute file transfer activities—in a safe and secure manner.
-
Unified Threat Management Guide
Sponsored by: SophosThis guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
-
Defending Against Application-Layer DDoS Attacks
Sponsored by: Juniper Networks, Inc.This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
-
Insights and Recommendations for Top Security Concerns; Annual Security Report
Sponsored by: Cisco Systems, Inc.This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
-
Getting the Most out of your NextGen Firewall
Sponsored by: Cisco Systems, Inc.This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.
-
HP TippingPoint Provides Next-Generation Network Security
Sponsored by: Hewlett Packard EnterpriseThis informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
-
Network Project of the Year 2014
Sponsored by: Talari_DON'T USEThis exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.
-
Talari Case Study: American Railcar Industries
Sponsored by: Talari_DON'T USEThis exclusive case study examines how an American manufacturer was able to utilize a network solution to prevent downtime, eliminate off-hour crises, and maximize efficiencies.
-
Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
Sponsored by: Palo Alto NetworksJoin this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
-
The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
Sponsored by: VormetricThis white paper defines the global legal obligations and financial services laws that require data encryption.
-
Computer Weekly – 10 June 2014: The case for a European cloud market
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, the European Commission wants to create a digital single market in Europe based on industry standard clouds – but is the plan realistic? Network encryption promises to solve many IT security threats – we examine the benefits. And our latest buyer's guide looks at business process management. Read the issue now.
-
Building a Better Network Security Strategy
Sponsored by: Hewlett Packard EnterpriseThis informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
-
A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model
Sponsored by: FireEyeThis informative survey explores zero-day attacks in 2013 and what they say about the traditional security model.
-
Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
Sponsored by: NEC Corporation of AmericaThis crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.