Network Security Research
-
Your Personal Web Attack Survival Guide
Sponsored by: ImpervaThis white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
-
The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
Sponsored by: ImpervaThis guide takes a look at 10 things that every web application firewall should provide.
-
Extreme Networks Physical Security Solution
Sponsored by: Extreme NetworksThis guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.
-
Seagate NAS - What's Driving Data Security and Remote Access Inside
Sponsored by: Seagate TechnologyCheck out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network.
-
Why Leaks Matter
Sponsored by: Lumeta CorporationThis exclusive white paper takes an in-depth look at the dangers of network leaks and how your organization can form a strategy to mitigate these risks through comprehensive visibility of connectivity.
-
Case Study: County Withstands a Near-Crippling Cyberattack
Sponsored by: Hewlett-Packard EnterpriseIn this case study, discover how San Deigo County withstood this almost devastating attack on election night.
-
Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users
Sponsored by: Dell SoftwareDiscover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.
-
5 Steps to Network Situational Awareness
Sponsored by: Lumeta CorporationThis exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
-
2014 Magic Quadrant for User Authentication
Sponsored by: SafeNet Asia LtdView this Magic Quadrant by Garner to uncover the leading vendor of authentication services, and what benefits it has to offer that will fit today and tomorrow's business needs.
-
Next-Generation Authentication: Keys to Balancing Security and Convenience
Sponsored by: SafeNet Asia LtdThis white paper highlights the top characteristics and requirements for next-generation authentication that's built to endure a constantly evolving and risk-filled IT landscape.
-
Cisco Smart Business Architecture
Sponsored by: CiscoThis white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
-
Hardware and Software Authentication: Choosing the Right Approach
Sponsored by: SafeNet Asia LtdIn this resource, uncover the top 5 considerations for choosing between hardware- or software-based authentication tools to ensure that assets remain protected even when remote users access corporate networks.
-
Why Application Delivery Controllers are an Essential Piece to your Network Puzzle
Sponsored by: CitrixWhen it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions.
-
Best Practices for Implementing 2048-Bit SSL
Sponsored by: CitrixThe role of secure sockets layer (SSL) technology is no longer a luxury, it is now a crucial part of all networking systems. This guide explores some best practices for implementing 2048-bit SSL and how it can benefit your network infrastructure.
-
Achieve Mobile Delivery with Citrix NetScaler
Sponsored by: CitrixThis guide explores the importance of transmission control protocol, application delivery controllers and how they can boost your network performance, availability and security.
-
A New Approach to Optimize IT and Solve the Application Visibility Challenge
Sponsored by: CitrixManaging your application performances is a task all IT departments face, and in order to ensure optimal speeds, it is crucial to monitor your network. This guide explores one company's solution to these challenges and how they can help you gain greater network visibility.
-
A Full-Service Network With Secure, Encrypted Communications
Sponsored by: Cisco Systems, Inc.In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
-
10 Must Haves for Secure Enterprise Mobility
Sponsored by: CitrixIn this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
-
Frost & Sullivan: Continuous Compliance and Next Generation NAC
Sponsored by: Forescout Technologies, Inc.Let's face it, cybercrime is growing and attacks are becoming far more prevalent. This guide explores the role of NAC in securing your network and how it is important to keep your network up-to-date as BYOD and mobility continue to rise.
-
Taming the Integration Nightmares of a 1,000 App Enterprise
Sponsored by: Palo Alto NetworksAccess this informative white paper today, which highlights an innovative integration approach that will enable you to significantly boost business agility and cost control.
-
Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks
Sponsored by: Palo Alto NetworksIn this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity.
-
Checklist: 5 Impactful Tips for Securing BYOD in the Enterprise
Sponsored by: Code42This comprehensive checklist includes 5 critical things to consider when constructing a mobile security strategy so that your organization can confidently utilize BYOD initiatives without worry of risk.
-
Seeding Clouds on Power Systems with IBM SmartCloud Entry - Executive Summary
Sponsored by: IBMAs cloud computing continues to grow, businesses are looking to decide which strategy is best for them. This guide explores a range of cloud services and how it will fit in with your system.
-
Secure virtual desktop infrastructure with Citrix NetScaler and Palo Alto Networks Next Generation Firewall
Sponsored by: Citrix and Palo Alto NetworksAs desktop virtualization continues to grow in popularity, organizations are looking to optimize their potential benefits. This guide explores virtual desktop infrastructure, potential implementation challenges and how to overcome these challenges.
-
Extending Role Security in Analysis Services for SQL Server
Sponsored by: Global KnowledgeThis step-by-step guide describes a method that allows users to extend role security in Analysis Services for SQL Server.