Whitepaper Library > Technology > Networking > Network Security
 

Network Security

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 201 - 225 of 433Sort Results By: Published Date | Title | Company Name
Free Offer Published By: Sophos     Published Date: May 09, 2013
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.
Tags : 
network protection, sophos, buyers guide, security, application security
    
Sophos
White Paper Published By: Comcast Business     Published Date: Apr 26, 2013
Learn how to select the most optimal business Ethernet service in this 9 step guide that will show you how to meet your many application needs while reducing costs.
Tags : 
ethernet, wan, wide area network, productivity, business continuity
    
Comcast Business
White Paper Published By: Wolfe     Published Date: Apr 18, 2013
Cloud services create a compelling case to move application processing and storage out of the data center and onto the network.
Tags : 
ethernet, cloud, application processing, storage, data center
    
Wolfe
White Paper Published By: HP and Intel®     Published Date: Feb 21, 2013
This strategy lets you leverage your existing virtualization investments in order to quickly and cost-effectively reap the full benefits of the cloud.
Tags : 
cloud, cloud computing, storage, networks, high availability
    
HP and Intel®
Free Offer Published By: McAfee     Published Date: Feb 12, 2013
AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.
Tags : 
mcafee, av-test, deep defender, rootkits, detection
    
McAfee
White Paper Published By: Cisco     Published Date: Feb 05, 2013
Read this whitepaper to better understand a migration to the cloud, how to get started, and what the next steps are for your organization.
Tags : 
private cloud, roi, network, server, virtualization
    
Cisco
Webinar Published By: Lumension     Published Date: Jan 18, 2013
Learn the recommended steps to cure your patch management headache as we dive into a technical discussion of what the critical items to address.
Tags : 
patch, best practices, networking, risk mitigation, network security
    
Lumension
White Paper Published By: Symantec     Published Date: Jan 11, 2013
Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors.
Tags : 
symantec, internet security, cyberattacks, cyber attacks, phishing
    
Symantec
Free Offer Published By: Sophos     Published Date: Jan 10, 2013
Evaluating the many components that make up an endpoint security solution may seem overwhelming. This buyers guide is designed to help. We’ve provided you with independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
sophos, security applications, web protection, spyware, secure data
    
Sophos
White Paper Published By: Trend Micro     Published Date: Oct 12, 2012
This free white paper provides a comprehensive overview of the threat as well as the advanced protection that enterprises can now use to protect their networks and information.
Tags : 
information technology, network, trend micro, network security
    
Trend Micro
White Paper Published By: Symantec     Published Date: Sep 19, 2012
Symantec vulnerability assessments help to reduce the cost and complexity of vulnerability management with automated scans, actionable reports, and a cloud-based architecture that requires no software installation or maintenance.
Tags : 
hackers, information technology, symantec, verisign, web applications
    
Symantec
White Paper Published By: Symantec     Published Date: Sep 19, 2012
This guide will de-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Tags : 
applications, information technology, symantec, verisign, web security
    
Symantec
White Paper Published By: Symantec     Published Date: Sep 19, 2012
The solutions to problems of computing security are varied and must be explored individually, but one technology shows up often: TLS or Transport Layer Security, often known by the name of the predecessor technology, SSL or Secure Sockets Layer.
Tags : 
business computing, information technology, symantec, verisign, web security
    
Symantec
Free Offer Published By: Webroot     Published Date: Sep 14, 2012
A free tool that provides the fastest, most comprehensive diagnostic report to help IT Managers identify where system issues exist.
Tags : 
system analyzer, security, improving performance, system scan, security threats
    
Webroot
White Paper Published By: SunGard     Published Date: Aug 13, 2012
Today's IT organizations are faced with the daunting task of optimizing all aspects of their departments, including people, processes and technology. Optimizing and streamlining server utilization through virtualization represents one particularly exciting example. We found that one of the most popular usage models for virtualization is to drive down server procurements in development, test and production environments. When this model is followed, future server purchases are avoided; instead, new workloads are established on existing systems.
Tags : 
leveraging, visualization, optimizing, processes, technology
    
SunGard
Free Offer Published By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : 
free online storage, online storage, file sharing, online file storage, share files online
    
Box
Webinar Published By: Rapid7     Published Date: May 22, 2012
Rapid7's CSO and Chief Architect of Metasploit leads this webcast which covers the most critical java-based security flaws and demonstrates the use of Metasploit in exploiting them. The target list includes web browsers, mobile platforms, embedded devices, application servers, and RPC services.
Tags : 
java, network security, security breach, security flaws, network intrusion
    
Rapid7
White Paper Published By: PC Mall     Published Date: Mar 03, 2012
As processor, memory, and disk technology have improved, HP ProLiant G7 servers have become ideal platforms for consolidating applications with virtual machines. Find out about HP 3G SATA hot plug solid state disks!
Tags : 
servers, server, hp servers, hp server, proliant
    
PC Mall
White Paper Published By: PC Mall     Published Date: Mar 03, 2012
With impressive performance scalability, the HP ProLiant DL385 G7 and ProLiant BL465c G7 attained outstanding results for two-processor platforms on the two-tier SAP® Sales and Distribution (SD) standard application benchmark.
Tags : 
servers, server, hp servers, hp server, scalability
    
PC Mall
Case Study Published By: Dell     Published Date: Mar 02, 2012
Since the emergence of the personal computer, IT managers have had to navigate through a computing and communications landscape where business and consumer technologies have intersected. Sometimes those intersections produce benefits for all involved; other times they result in destructive collisions.
Tags : 
dell, idg, mobile technology, mobile data, mobile phones
    
Dell
White Paper Published By: HP & Intel     Published Date: Feb 18, 2012
Read the results of this survey of 200 IT professionals sounding off on a wide variety of cloud topics.
Tags : 
convergence, infrastructure, monitoring, network architecture, network performance
    
HP & Intel
White Paper Published By: CyrusOne     Published Date: Jan 19, 2012
This paper explores issues that arise when planning for growth of Information Technology infrastructure and explains how colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
colocation, cloud, infrastructure, data centers, data center planning
    
CyrusOne
White Paper Published By: BMC     Published Date: Jan 05, 2012
Learn more on how users can customize their cloud services - while you maintain control.
Tags : 
bmc, cloud, cio, cto, hardware
    
BMC
White Paper Published By: Aerohive     Published Date: Jan 04, 2012
In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.
Tags : 
aerohive, branch office, cloud computing, remote networks, vpn
    
Aerohive
White Paper Published By: Focus     Published Date: Dec 12, 2011
Read this FREE report today and look forward to a faster and more reliable network tomorrow.
Tags : 
faster network, network, budget, overhaul, flexibility
    
Focus
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.