network security

Results 976 - 1000 of 1145Sort Results By: Published Date | Title | Company Name

Case Study - OEM's Increased Global Network Performance

Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Faced with degrading network performance and the need to drive global expansion, Measurement Specialties partnered with Virtela to design, implement and manage a high-performance, multi-carrier MPLS network across all twelve of their global sites.
Tags : 
virtela, network performance, multi-carrier mpls network, original equipment manufacturers, point-to-point connections, network and security solutions, network management, network performance management
    
Virtela Communications, Inc.

Top 10 Reports for Managing Vulnerabilities

Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations
    
Qualys

The Top 10 Reports for Managing Vulnerabilities

Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities, security management
    
Qualys

Endpoint Security: Proactive Solutions for Networkwide Platforms

Published By: ESET     Published Date: Oct 07, 2009
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology. The threat landscape facing businesses has evolved significantly, and corporations are looking for security products that can protect against known threats and prepare for future attackers in a simple-to-use architecture.
Tags : 
eset, security, threatsense, malware, threat trends, conficker, virus, agent
    
ESET

Webcast: Security convergence equals network security cost savings

Published By: IBM     Published Date: Sep 11, 2009
Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.
Tags : 
ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions, convergence, network management
    
IBM

Take a holistic approach to business-driven security

Published By: IBM     Published Date: Sep 10, 2009
Take a business-level view of security and risk management, so you can prioritize security activities and focus on those that make the most strategic sense. With this white paper, learn to direct resources to mitigate risk and costs.
Tags : 
ibm, security, risk domains, cyber security industry alliance, network, server and end point, it security, application security
    
IBM

InterScan Messaging Hosted Security

Published By: Trend Micro SaaS     Published Date: Sep 01, 2009
This comprehensive hosted service blocks email threats before they can touch the network, integrating powerful anti-spam and anti-phishing with award-winning antivirus and anti-spyware. Security leader Trend Micro updates and tunes the solution to keep the customer's network secure while saving valuable IT resources.
Tags : 
saas, trend, trend micro, software as a service, trendlabs, email security, security, interscan messaging
    
Trend Micro SaaS

SIEM and IAM Solutions: A10 Networks Solves Complexities

Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks

Automating User Authentication: Simplifying Network Troubleshooting & Security Forensics

Published By: A10 Networks     Published Date: Aug 21, 2009
Troubleshooting network and security problems in a time of crisis is never easy and the need to resolve mysterious machine addresses such as MAC and IP Addresses back to individuals or hosts is often difficult and time consuming. Download this solution sheet and see how A10 Networks' IDentity Proxy Service can automate the task of resolving host addresses back to individuals to speed network and security troubleshooting and forensics.
Tags : 
ip address, identity, network security, identity management, mac address, network management, troubleshoot, a10
    
A10 Networks

Increase Productivity and Reduce Security Risks for Teleworkers

Published By: Aventail     Published Date: Aug 21, 2009
Learn how to adequately protect your network while expanding your remote access capabilities. Read the free white paper, 'Increase Productivity and Reduce Security Risks for Teleworkers'.
Tags : 
ssl, vpn, mobile workers, remote workers, mobile workforce, remote workforce, network security, remote access
    
Aventail

End Point Control: Secure Remote Access with Reduced Risk and Increased IT Control

Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail, remote access
    
Aventail

Secure Wireless Networking Using SSL VPNs

Published By: Aventail     Published Date: Aug 21, 2009
Companies are embracing wireless technologies to increase productivity, provide more flexible work arrangements for their employees, and work more closely with their business partners. Read this white paper to learn how SSL VPNs deliver a means of protecting every node, whether internal or external to the enterprise.
Tags : 
ssl, vpn, network security, wireless networking, ssl vpn, wlan infrastructure, infrastructure, wireless infrastructure
    
Aventail

SSL VPN Checklist

Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Checklist details important capabilities to consider when evaluating and comparing SSL VPN vendors and their technology solutions. Enterprise requirements are organized into six broad categories: application-level experience and support, security enforcement, flexible policy management and administration, ease of use, leadership and vision, and financial strength and reputation.
Tags : 
virtual private network, ssl vpn, ssl, vpn, ssl vpn requirements, vpn requirements, system requirements, policy management
    
Aventail

Infonetics Report: Enforcing Network Access Control Market Outlook and Worldwide Forecast

Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail
    
Aventail

Achieving NAC Now and in the Future: The Role of SSL VPNs

Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies
    
Aventail

Secure Mobile Access Using SSL VPNs

Published By: Aventail     Published Date: Aug 21, 2009
In this white paper mobility expert Peter Rysavy discusses how Aventail SSL VPNs provide one secure gateway for access from any device, ensuring only authorized users get access to resources. And, with access that's optimized for specific device types, users only see information that's relevant to them at the time of access.
Tags : 
ssl, vpn, encryption, secure remote access, ssl vpn, secure mobile, mobile workers, secure mobile device
    
Aventail

Gartner Report: Magic Quadrant for SSL VPN

Published By: Aventail     Published Date: Aug 21, 2009
Are you evaluating remote access solutions? Look at vendors with mature technology, a vision for the future of remote access, and a proven track record. Hear what Gartner, considered the leading analyst firm covering the SSL VPN industry, has to say about it.
Tags : 
ssl, vpn, analyst report, gartner group, gartner, virtual private network, remote access, ssl vpn
    
Aventail

IPSec vs. SSL VPNs for Secure Remote Access

Published By: Aventail     Published Date: Aug 21, 2009
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
Tags : 
vpn, ssl, ssl vpn, ipsec, secure remote access, remote access security, network security, aventail
    
Aventail

The 5 Essential Advantages: Agentless Technology for Data Protection Management

Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada, servers
    
Bocada

The Role Of SAN Security In Storage Operations Management

Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity
    
Creekpath

iDirect Network Accelerators

Published By: iDirect     Published Date: Aug 21, 2009
Secure communications is a necessity for many organizations to protect corporate data. Some highly secure organizations mandate the use of third-party encryption devices or external end to end security protocols. The iDirect Network Accelerator is an external appliance that maximizes the speed of encrypted traffic over a satellite network.
Tags : 
network security, encryption, secure communications, idirect, network accelerator, traffic management, cots, ipsec
    
iDirect

Defining the Rules for Preemptive Host Protection

Published By: Internet Security Systems     Published Date: Aug 21, 2009
Protecting desktop and server, or host systems has rapidly become a high priority for organizations that want to ensure uptime and the availability of day-to-day business applications. Today's hybrid threats are growing faster, more complex and more destructive.
Tags : 
intrusion prevention, high availability, network security, iss, internet security, web security, malware, internet security systems
    
Internet Security Systems

Multi-layered Security Solutions For VoIP Protection

Published By: Internet Security Systems     Published Date: Aug 21, 2009
Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the PSTN. As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons.
Tags : 
voip, voice over ip, ip telephony, voip security, secure voip, pstn, network security, internet security
    
Internet Security Systems

Remote Office Security: An Integrated, Preemptive System from Gateway to Desktop

Published By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : 
mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems
    
Internet Security Systems

Getting the Knack of NAC: Understanding Network Access Control

Published By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : 
network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based
    
Mirage Networks
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.