Network Security Research
-
EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager
Sponsored by: IBMMany security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.
-
Network Evolution E-Zine: Hybrid Cloud Networking
Sponsored by: TechTarget NetworkingThis issue of Network Evolution E-Zine examines the challenges of implementing common routing, firewalls, application delivery control and WAN optimization across private and public domains.
-
Top 10 Considerations for Deploying Lync on Smartphones and Tablets
Sponsored by: Aruba NetworksMicrosoft Lync is becoming an increasingly important part of enterprise telephony by offering a more collaborative interaction. This brief guide outlines the top ten considerations for deploying Microsoft Lync on smartphones and tablets.
-
Cisco Any Device: Planning a Productive, Secure and Competitive Future
Sponsored by: CiscoDiscover the details of the "Any Device" vision and why providing an optimal, predictable end-user experience on the device of your employees' choice can help you maintain or even enhance your organisation's competitive advantage, productivity, and security.
-
Compliance Management's Seven Steps to Success
Sponsored by: InfobloxFailure to meet compliance can result in fines, dangerous network exposure and damage to a company's reputation. Traditional techniques leave many organizations at risk. Read this white paper to learn 7 critical steps to achieve network compliance.
-
Automation: The Future of Network Visibility
Sponsored by: IxiaAs the trend towards data center automation continues, network monitoring becomes increasingly important when optimizing your network. In this white paper, they will explore the data center automation and its importance to company performance and efficiency.
-
Best Practices for Lawful Intercept in Enterprise and Service Provider Networks
Sponsored by: IxiaIt is becoming increasingly important for service providers to support lawful data intercept requests. This guide explores data intercepts and how they are expanding far into the data world.
-
Integrating security with HP TippingPoint
Sponsored by: HP & Intel®Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance.
-
Mobile Security Insider's Edition
Sponsored by: TechTarget SecurityThis Insider Edition explores some of the most useful tools and strategies for reducing threats to your network and protecting your critical data in the era of BYOD.
-
Why You Need A Next-Generation Firewall
Sponsored by: Hewlett Packard EnterpriseThis white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
-
Strong Authentication: Achieve the Level of Identity Assurance You Need
Sponsored by: HID GlobalIn this resource, uncover the growing need for stronger authentication systems that manage user credentials across various levels of access, ensuring security from any device or location.
-
Sample Corporate Mobile Device Acceptable Use and Security Policy
Sponsored by: WisegateIn this exclusive white paper, gain insight on how senior-level IT security professionals have approached the bring-your-own-device (BYOD) trend thus far, and which strategies have led to success or failure.
-
Making the Most of BYOD Opportunities
Sponsored by: Dell and VMwareAccess this informative white paper to unveil the true value behind bring-your-own-device (BYOD) programs, and properly enable device diversity and enforce appropriate safeguards to keep personal and business items separate for optimum business productivity.
-
Optimal Visibility for Your Network: Expert Insight
Sponsored by: GigamonLearn about the security visibility on network traffic capture systems available today and how to take full advantage of its benefits.
-
The Pros and Cons of SSL Decryption for Enterprise Network Monitoring
Sponsored by: Symantec CorporationSearchSecurity.com expert on network security, Brad Casey discusses the pros and cons of SSL decryption to determine its viability as an enterprise network monitoring aid. Read the e-guide and hear his opinion on how to use SSL decryption as an enterprise security tactic.
-
Endpoint Security: Anti-Virus Alone is Not Enough
Sponsored by: LumensionAccess this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
-
What is an Application Delivery Controller (ADC)?
Sponsored by: Citrix Systems, Inc.This white paper details how application delivery controllers can help ensure the performance of your applications.
-
Malicious Mobile Apps
Sponsored by: OpenText Security SolutionsIn this white paper, get industry statistics about today's IT threat landscape, and why IT professionals should heighten mobile security to defend against significant malicious mobile applications.
-
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
Sponsored by: Core Security TechnologiesThis white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
-
The Use Case for Integrated Vulnerability Management CORE Security
Sponsored by: Core Security TechnologiesThis white paper emphasizes the importance of an effective vulnerability management infrastructure to avoid data overload challenges and explores how to stay on track by consolidating, analyzing, and prioritizing data for maximum security.
-
The Azzurri IT Leader Peer-to-Peer Opinion Exchange 2013
Sponsored by: AzzurriThis resource features an opinion exchange on the trend in mobile device use for business workload, whether it's bring-your-own-device (BYOD), choose-your-own-device (CYOD), or don't-bring-your-own-device (DBYOD), and what this means for data security.
-
The Network without Borders
Sponsored by: TechTarget NetworkingThis handbook looks at how to design and manage the new endpoint-driven network and extend secure access to private and public cloud services and virtual applications.
-
Enterprise Networks: Four of the Top Trends
Sponsored by: AzzurriIn this white paper, unveil the top 4 trends in enterprise networking for 2014, and use these as guidelines in your network management planning for next year.
-
Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website
Sponsored by: GeoTrust, Inc.This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more.
-
Why Switch to Thawte?
Sponsored by: Thawte Inc.This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.