lan security

Results 401 - 425 of 477Sort Results By: Published Date | Title | Company Name

Technology Brief: Absolute Software Expands Lifecycle Management

Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software

The Remote Access Imperative in Disaster Recovery

Published By: Aventail     Published Date: Aug 21, 2009
Disaster recovery is not only needed for catastrophic events like natural disasters or pandemics, but for any event, like a snow storm or power outage that keeps your workers from getting to the office and disrupts your business. This white paper by business continuity expert Tim Clark of Fact Point Group, explores best practices for disaster recovery and the key role of SSL VPNs in that process.
Tags : 
disaster plan, disaster recovery plan, disaster recovery, high availability, business continuity, best practices, ssl, vpn
    
Aventail

HP Simply Business Protection

Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks
    
HP

Global Trust / Securing the Enterprise

Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok, identity management
    
Okiok

Winning outsourcing strategies: How to increase value and reduce risk

Published By: Quocirca     Published Date: Oct 29, 2008
Outsourcing is a strategy increasingly being used by organizations to reduce costs and increase value. Outsourcing, however, has its risks. As organizations look to push out more of their custom software application development needs to outsourcing partners, careful planning is required in terms of building stringent software security requirements into contracts and creating a process and metrics to ensure that those requirements are met. This report examines outsourcing practices from 200 of the largest organizations in the UK and the US and provides pointers as to how the most experienced outsourcers are putting in place effective processes to drive the risk out of outsourcing.
Tags : 
quocirca, outsourcing, security, networking, software development, software outsourcing
    
Quocirca

Extending Your Management Reach to Remote Users

Published By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : 
network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access
    
LANDesk

Protecting Your Corporate Network: What Do You Know About the Endpoint Device?

Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the network access control capabilities of LANDesk® Trusted Access™ available within LANDesk Security Suite 8.6 help organizations protect and secure their enterprise networks at their endpoints to reduce malicious attacks and the resulting downtime, lost productivity, and lost revenues.
Tags : 
network security, access control, nac, network access control, intrusion prevention, landesk
    
LANDesk

Front-Line Malicious Code Defense for the Enterprise from a Single Management Console

Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : 
network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware
    
LANDesk

Leveraging Intelligence Resources

Published By: SOCRATIQ Intelligence Systems     Published Date: Feb 14, 2007
This White Paper discusses how intelligence agency management can apply machine translation as a much-needed support tool that can make linguists and intelligence analysts more effective in producing meaningful and actionable results.
Tags : 
translation, terrorists, homeland security, language, socratiq, voice recognition, business management, cia
    
SOCRATIQ Intelligence Systems

Virtualization Security Playbook

Published By: Blue Lane     Published Date: Aug 31, 2007
Virtualization has become all the rage for companies interested in optimizing their servers and storage systems. This shift in data center architecture allows IT organizations to reduce operational costs and increase flexibility and responsiveness to changing business demands. But in this rush to virtualize, security can fall by the wayside.
Tags : 
virtualshield, virtual shield, virtualization, security, network security, vmware, vm ware, bluelane
    
Blue Lane

Who Leads in WLAN Security? Comparative Evaluation of Vendor Offerings and Positioning

Published By: Trapeze Networks     Published Date: Apr 16, 2007
This analyst report written by Stan Schatt, VP & Research Director, Networking at ABI Research  helps you decipher the WLAN security alphabet soup, understand architectural approaches to WLAN security, upcoming standards for roaming, load balancing and management frame encryption, and key security requirements that you should consider for you next WLAN deployment.
Tags : 
wi-fi, wireless, wlan, remote technologies, roaming, encryption, access point, service set identification
    
Trapeze Networks

Solving the Firewall/NAT Traversal Issue of SIP

Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony
    
Ingate Systems

Patch Management with GFI LANguard N.S.S. & Microsoft WSUS

Published By: GFI     Published Date: Jun 14, 2007
This white paper provides an overview of how to use GFI LANguard Network Security Scanner (N.S.S.) and Microsoft Windows Software Update Services (WSUS) to keep your network automatically updated with the latest security patches.
Tags : 
patch, patches, patch management, windows, windows patch, windows update, windows updates, network security
    
GFI

Using GFI LANguard Network Security Scanner to Secure Your Internal Network

Published By: GFI     Published Date: Jun 14, 2007
This document shows you how to use GFI LANguard N.S.S. to identify vulnerabilities on your network (excerpt from manual).
Tags : 
vulnerability assessment, vulnerability management, auditing, audit, security management, languard, pki, patch management
    
GFI

Best Practices: LAN Security and 802.1X

Published By: Nevis Networks     Published Date: Sep 04, 2007
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
Tags : 
security policies, policy management, authentication, access control, lan, lan security, 802.1x, nevis
    
Nevis Networks

LAN Security: Identity-Based Solution Guide

Published By: Nevis Networks     Published Date: Sep 04, 2007
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Tags : 
lan, lan security, network security, security policies, security policy, policy management, best practices, nevis
    
Nevis Networks

Best Practices for Deploying LAN Security and NAC

Published By: Nevis Networks     Published Date: Sep 04, 2007
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Tags : 
lan, local area networking, nac, access control, network security, infrastructure, lan security, nevis
    
Nevis Networks

Oregon Community Credit Union Gains Peace of Mind by Encrypting Backup Tapes with NeoScale

Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.

Promiscuous Monitoring in Ethernet and Wi-Fi Networks

Published By: TamoSoft     Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
Tags : 
monitoring, lan, wan, best practices, networking, wlan, wireless security, tamosoft
    
TamoSoft

Secure Network Access for Contractors, Business Partners and Guests

Published By: Identity Engines     Published Date: Mar 24, 2008
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
Tags : 
idengines, id engines, identity engines, access control, authentication, local area networking
    
Identity Engines

KEMP LoadMaster Support for Windows Terminal Services

Published By: KEMP Technologies     Published Date: Aug 04, 2008
KEMP Technologies LoadMaster Application Delivery Controller and Server Load Balancer appliances provide full support for Microsoft Windows Terminal Services (WTS). The LoadMaster WTS capabilities helps organizations maximize the efficiency and effectiveness of their networks. KEMP delivers this at an affordable price.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

A Guide to Application Delivery Optimization and Server Load Balancing for the SMB Market

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s small-to-medium sized businesses (SMB) are undergoing the same IT evolution as their enterprise counterparts, only on a smaller scale. For SMBs, website reliability, flexible scalability, performance and ease of management are as essential to SMB website infrastructure as they are to an enterprise. It’s fare to say that these capabilities are an important operational imperative for businesses of all sizes.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

Optimizing Web and Application Infrastructure on a Limited IT Budget

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Today’s web and application infrastructure continues to expand applications for e-commerce, and communications with customers, partners and internal employees. For those responsible for deploying, maintaining and supporting these networked applications, there is an increasing need to get the highest performance out of datacenter equipment, while simplifying the complexity that causes excess overhead and unnecessary costs.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

LoadMaster Application Delivery Controller Security Overview

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

KEMP Technologies’ LoadMaster Products Reduce Datacenter Power Consumption

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Kemp Technologies’ LoadMaster Application Delivery Controller (ADC) and Server Load Balancer (SLB) appliances are low energy consumers. Reducing energy use at the point of consumption, LoadMaster provides benefits to other areas by reducing load on power and cooling facilities, which in turn reduce their own energy use.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.