Network Security Research
-
Detecting and Preventing Retail Cyber Crime
Sponsored by: LogRhythm, Inc.Continue on to this important whitepaper now to learn how to properly instrument and monitor for anomalous activity. Also discover a security intelligence platform that can directly monitor endpoints and much more.
-
Web Application Firewalls Are Worth the Investment for Enterprises
Sponsored by: ImpervaThis resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
-
Definitive Guide to Next Generation Network Access Control
Sponsored by: Forescout Technologies, Inc.This in-depth guide provides valuable insight on next-generation network access control and how it can help your network remain secure, while enhancing performance.
-
Cisco Cloud Web Security: Single Interface for Global Control
Sponsored by: Cisco Systems, Inc.This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.
-
Web Security – Virtual Appliance
Sponsored by: Cisco Systems, Inc.Watch this webcast to see how you can best protect your Web-accessible assets with a strong protection solution that ensures security wherever your data goes.
-
Retail Cyber Crime
Sponsored by: LogRhythm, Inc.This guide explores the growing trend of retail-based cybercrime and the importance of securing your point-of-sale endpoints.
-
NSS Labs 2013 Network IPS Comparative Analysis
Sponsored by: IBMThis resource explores the necessary elements to focus on when deploying a successful intrusion prevention system (IPS).
-
Unlock the value of BYOD: Go mobile without sacrificing security
Sponsored by: IBMThis paper explores how organizations can derive business value in the BYOD era, while still providing a security-rich IT infrastructure and consistent service levels.
-
What Will Security for the Network of the Future Look Like?
Sponsored by: Cisco Systems, Inc.This whitepaper takes a look at the future of data center infrastructure that addresses security concerns in an increasingly mobile world.
-
Buyer's Criteria for Advanced Malware Protection
Sponsored by: SourcefireThis guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
-
Preventing Data Center Downtime
Sponsored by: GigamonIt goes without saying that your data center is the lifeblood of your organization. This guide explores how you can minimize data center downtime and why doing so is extremely important.
-
Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018
Sponsored by: Cisco Systems, Inc.This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.
-
Magic Quadrant for Intrusion Prevention Systems
Sponsored by: SourcefireThis guide explores one company's intrusion prevention system and how it can integrate smoothly with your next-generation firewalls to ensure top-notch security.
-
Buyer's Criteria for Next-Generation Network Security
Sponsored by: SourcefireThis whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
-
Strategies For Securing Virtualized Environments
Sponsored by: SourcefireThis whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
-
Selecting a Next-Generation Firewall: Top 10 Considerations
Sponsored by: CiscoIn this white paper, learn about the 10 features your next-generation firewall should have to protect your network from a range of threats.
-
The Critical Incident Response Maturity Journey
Sponsored by: CiscoThis paper focuses on defining levels of critical incident response maturity and how organizations can continually improve their incident response capabilities to help reduce the risk of experiencing a damaging incident.
-
Secure Network Access for Personal Mobile Devices
Sponsored by: CiscoThis resource offers a solution to the challenges of mobility in the workplace, helping organizations realize the full benefits of BYOD without sacrificing strong security.
-
Thriving in a BYOD World: 3 steps to Enterprise Mobility
Sponsored by: Hewlett Packard EnterpriseRead this resource to reveal 3 critical steps to take when building a complete and secure mobile strategy.
-
How to Protect the Increasingly Vulnerable Energy Industry
Sponsored by: IBMLearn how an integrated security intelligence platform provides the necessary components to help energy and utilities companies automate compliance and risk management, detect and manage threats, and protect the smart grid from both security breaches and cyber-attacks.
-
Citrix XenMobile and Cisco ISE Integration
Sponsored by: Cisco Systems, Inc and CitrixThis whitepaper introduces you to a comprehensive management platform that combines the power of network access control, intelligent monitoring and automation, and comprehensive security management for content, applications and devices.
-
BYOD, mobile collaboration and network security
Sponsored by: CiscoThis guide explores the current state of workplace mobility, BYOD and what you can do to ensure security for user-devices.
-
Modern network security for modern threats
Sponsored by: Palo Alto NetworksThis exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security.
-
Achieve Deeper Network Security and Application Control
Sponsored by: DellEMC and Intel®Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
-
How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
Sponsored by: FireEyeThis white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.