network security

Results 851 - 875 of 1153Sort Results By: Published Date | Title | Company Name

HRG Assessment: Comparing IBM PureSystems and Cisco UCS

Published By: IBM     Published Date: Oct 01, 2012
Customers require flexible, agile and easy to consume IT solutions to succeed in business. Harvard Research Group (HRG) has taken a closer look at IBM PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, cisco, expert integrated systems, servers, storage, networking, management, security
    
IBM

Anatomy of a Botnet

Published By: Arbor Networks     Published Date: Sep 29, 2012
Botnets and DDoS attacks are perceived as being malevolent and unstoppable. Fortunately there are companies like Arbor Networks, who are dedicated to analyzing and stopping botnets and DDoS attacks on a global basis.
Tags : 
ddos attacks, distribution denial of service, botnet, network infrastructure, database security, data center, security threats, anti virus
    
Arbor Networks

How Small and Midsize Firms Worldwide Can Capitalize on New Mobile Resources

Published By: SAP     Published Date: Sep 12, 2012
The impact of new mobile technology can be dramatic for small and midsize firms, and there is clear opportunity for improving worker efficiency while ensuring network security. Read the questions posed by SAP to Raymond Boggs, vice president of IDC's Small/Medium Business Research practice, on behalf of SAP's customers.
Tags : 
mobile resources, mobile solutions, sme, mobile devices
    
SAP

ROI of Network Monitoring Switches: Three Case Studies

Published By: EMA     Published Date: Aug 21, 2012
As network traffic continues to grow, network-based security, performance and compliance monitoring becomes increasingly critical.
Tags : 
ema, ixia, roi network, trafficing, jim frey, security
    
EMA

The Pragmatic Path to Achieving NAC Results: Essential Implementation, Process and Control

Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data
    
ForeScout

"Your Pad or Mine?" Enabling Secure Personal and Mobile Device Use On Your Network

Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use
    
ForeScout

Data and Identity Security

Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents
    
CDW Symantec

Quest Workspace Privilege Manager

Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Privilege Manager lets IT administrators grant selected privileges to users so they can update their own PCs, reducing help desk calls while maintaining a secure network. Elevate and manage user rights quickly and precisely with our Validation Logic targeting technology. Use privilege elevation rules from the Privilege Authority Community Edition, or create your own rules and allow administrator-level access to only the applications, Windows processes and ActiveX controls you deem safe.
Tags : 
user access, network security, verify files, elevate activex, setup.exe, setup.msi, elevate applications, target workstations
    
Dell Software

Vulnerability Management Buyer's Checklist

Published By: Qualys     Published Date: Jul 20, 2012
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data. Without proven, automated technology for precise detection and remediation, no network can withstand the daily onslaught of new vulnerabilities that threaten security. This checklist from Qualys provides a 12 point shortlist of considerations to determine what solutions will work best for your organization.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, vulnerability management, firewalls
    
Qualys

Guide: The Top 10 Reports for Managing Vulnerabilities

Published By: Qualys     Published Date: Jul 20, 2012
Vulnerabilities are very common nowadays. Even being a safest network does not mean that it cannot be compromised. It's how you handle these vulnerability and flaws and rectify the issues. In order help the security engineers Qualys, Inc. pioneer security brings free guide on Top 10 reports for Managing Vulnerability. This paper cuts through the data overload generated by some vulnerability detection solutions.
Tags : 
technology, security, vulnerabilities, internet, virus, solutions, anti spam, anti spyware
    
Qualys

Eliminating Data Center Compromise With Next-Generation Firewalls

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Palo Alto Networks uniquely delivers on the network security demands found in both types of data center environments.
Tags : 
palo alto, enterprises, infrastructure, business technology
    
Palo Alto Networks

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprise-focused, and distinct, many network security vendors are claiming NGFW is a subset of other functions.
Tags : 
    
Palo Alto Networks

2011-2012 Firewall Buyers Guide

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
The threats that enterprise network and security teams face are evolving rapidly, and the security products that they implement play a major role in the success or failure of the organization's overall security strategy.
Tags : 
firewall, 2011-2012, enterprise, network, security, business technology
    
Palo Alto Networks

Easy Network Intrusion with Java

Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion, identity management, internet security, intrusion detection
    
Rapid7

Save Your Company Time and Money with a Vulnerability Management Tool - Try GFI LanGuard for 30 Days

Published By: GFI Software     Published Date: May 18, 2012
GFI LanGuard provides a complete network security overview with minimal administrative effort. Why use GFI LanGuard? Download this free trial to experience the benefits!
Tags : 
gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, security
    
GFI Software

The Future Of Data Security And Privacy: Controlling Big Data

Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing, application security
    
Forrester

Coming to Grips with Consumerization - 60 Minutes with Nir Zuk - On-Demand Video Broadcast

Published By: Palo Alto Networks     Published Date: May 09, 2012
In this on-demand video broadcast, hear Nir Zuk, CTO and co-founder of Palo Alto Networks and Rich Mogull, Analyst and CEO of Securosis, provide insights and recommendations on how to handle consumerization and the proliferation of devices.
Tags : 
palo alto, palo alto networks, consumerization, proliferations, applications, mobile, mobile devices, controls
    
Palo Alto Networks

Redefining Next Generation Security with Situational and Context Awareness

Published By: McAfee     Published Date: Apr 25, 2012
The best protection against today's network threats are solutions that are adaptable, dynamic, easily managed, contextually-aware and affordable. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Deploy and Maintain Thousands of Security Devices in Seconds

Published By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Combining Modern Authentication Needs with Identity and Access Management

Published By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Improving VDI with Scalable Infrastructure

Published By: F5 Networks Inc     Published Date: Apr 17, 2012
Learn how to unburden your VDI infrastructure and gain added security, network performance improvements and optimizations, while improving the architecture for non-VDI application specific systems.
Tags : 
virtual desktop, virtual desktop infrastructure, vdi, vdi impact on the network, vdi performance, vdi security, vdi management, vmware view
    
F5 Networks Inc

See no evil? Why packet capture accuracy should matter to you

Published By: Endace     Published Date: Apr 12, 2012
In this whitepaper find out what you need to know about network visibility, network security and network forensics in 1, 10, 40 and 100Gbps network environments.
Tags : 
endace, pack capture, data management, business technology
    
Endace

2012-2013 WLAN Buyer's Guide

Published By: Aerohive     Published Date: Apr 11, 2012
Today Wi-Fi tends to be the primary network access method for many. This paper discusses key requirements to consider as you plan for a WLAN purchase.
Tags : 
aerohive, wlan, lan, branch office, cloud computing, remote networks, vpn, cloud enabled networking
    
Aerohive
Start   Previous    28 29 30 31 32 33 34 35 36 37 38 39 40 41 42    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.