Network Security Research
-
Protecting DNS Infrastructure—Inside and Out
Sponsored by: InfobloxThis white paper unveils the critical risk your domain name system (DNS) is in, and offers leading strategies to help you protect your infrastructure against outside-in and inside-out threats.
-
The University of Leeds Stops Millions of Attacks and Countless Illegal Downloads with HP TippingPoint
Sponsored by: Hewlett Packard EnterpriseThis case study focuses on the University of Leeds' experience with an intrusion prevention system (IPS) that helped IT secure networks without disturbing Web access.
-
Coming at You: How to Deal with the Latest DDoS Attacks
Sponsored by: TechTarget SecurityAccess this TechGuide to learn more about DDoS threats and how to protect your systems—while shape-shifting cyberattackers are tough to stay ahead of, they're too destructive to ignore.
-
The Bot Threat
Sponsored by: Hewlett-Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
-
Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center
Sponsored by: CitrixWhen it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions.
-
Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
Sponsored by: Symantec CorporationTune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
-
Reduce Federal Infrastructure Risk with Compliance Management and Situational Awareness
Sponsored by: IBMThis white paper features holistic information and network security tools that help federal agencies meet strict compliance mandates.
-
Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
Sponsored by: DellEMC and Intel®Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
-
Keeping Distributed Endpoints Safe and Compliant
Sponsored by: IBMKeeping distributed endpoints safe and compliant has become a costly, complex and time consuming task. In this resource uncover how to overcome these challenges with an approach that provides real-time visibility and control over endpoints and quickly remediates issues to help ensure continuous security and compliance.
-
The Fight for Full Network Visibility in a Dangerous World
Sponsored by: APCON, Inc.This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
-
About APCON – Intelligent Network Monitoring Solutions
Sponsored by: APCON, Inc.This video introduces APCON, who develop industry-leading scalable network switching solutions that provide complete network visibility, improved network security, and optimized monitoring tool efficiency.
-
Guarding the Castle
Sponsored by: DellEMC and Intel®Discover the top four strategies and tools that cybercriminals use to infiltrate your network, and how you can stop them. Read this e-book and learn the importance of securing your network every minute of the day against all types of malware, and how a high performance firewall helps you protect against the latest global threats.
-
Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks
Sponsored by: IBMThis white paper offers background on today's malware and its 4 predictable steps. Click through to discover a set of integrated solutions that offer improved visibility and defense to block advanced attacks.
-
Three Key Strategies to Prevent Network Outages
Sponsored by: KEMP TechnologiesThis informative whitepaper explores 3 key strategies for preventing network outages and highlights the top 3 threats to your network uptime.
-
Transferring Data without Secure Protocols?
Sponsored by: GlobalscapeThis white paper outlines a solution that protects your data wherever it may be so that your users can remain productive.
-
Monitor Your Virtual Network to Maintain 100% Visibility
Sponsored by: APCON, Inc.This brief whitepaper explores a unique tool for monitoring your network and maintaining 100% visibility.
-
Multi Stage Filtering
Sponsored by: APCON, Inc.This informative guide explores the current challenges networks face when it comes to increased traffic and how effective packet filtering can help you.
-
How Are DDoS Attacks Evolving?
Sponsored by: Neustar®This resource highlights the top 8 changes in distributed denial of service (DDoS) attacks that most organizations aren't ready to defend against.
-
Tolly Test Report: IBM Security Web Gateway Appliance
Sponsored by: IBMThis white paper highlights the features and benefits of a security Web gateway appliance that successfully blocks potential Web application threats.
-
A Six-Step Plan for Competitive Device Evaluations
Sponsored by: IxiaDiscover a methodology for conducting product evaluations that provide insight into the performance, security and stability of devices within production and data center environments.
-
Virtualization Security Report: 10 Ways to Regain Control and Reduce Risk
Sponsored by: CitrixThis resource highlights the top 10 benefits of adding desktop virtualization to information security strategies for an increasingly diverse and expansive IT environment.
-
The Danger Deepens: Neustar Annual DDoS Attacks and Impact Report
Sponsored by: Neustar®This resource analyzes survey results regarding distributed denial of service (DDoS) attacks to see how they've evolved into an even great threat. Click through to learn how you should prepare.
-
7x Replication Improvement
Sponsored by: Silver PeakThis exclusive case study discusses how a savings bank was able to use a virtual replication acceleration solution to improve their replication seven-fold, meeting their recovery point objective (RPO) at half the price of WAN optimization hardware with all the benefits of virtualization.
-
Navigating Today's DDoS Landscape
Sponsored by: IxiaLearn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
-
Testing the Cloud: Definitions, Requirements, and Solutions
Sponsored by: IxiaTesting of cloud services has some familiar aspects and some new challenges. Gain an understanding of the risks in the cloud, and how to safeguard your organization.