Whitepaper Library > Technology > Networking > Network Security
 

Network Security

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 301 - 325 of 434Sort Results By: Published Date | Title | Company Name
Free Offer Published By: ESET     Published Date: Feb 01, 2008
With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.
Tags : 
2008 predications, it security predictions, it security, mobile devices, laptops
    
ESET
White Paper Published By: Solidcore     Published Date: Jan 07, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.
Tags : 
pci, pci dss, pci compliance, compliance, payment card
    
Solidcore
White Paper Published By: netForensics     Published Date: Jan 04, 2008
To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.
Tags : 
monitoring, hackers, internal threats, bad employee, identity theft
    
netForensics
White Paper Published By: Guardian Digital     Published Date: Oct 02, 2007
Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.
Tags : 
open source, open source security, network security, adaptability, security management
    
Guardian Digital
White Paper Published By: Guardian Digital     Published Date: Oct 02, 2007
Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."
Tags : 
open source, open source security, network security, adaptability, security management
    
Guardian Digital
White Paper Published By: BlueCat     Published Date: Sep 14, 2007
This paper introduces and describes the principal concepts and techniques involved with DNS best practices.
Tags : 
dns, dns server, dns servers, server, servers
    
BlueCat
White Paper Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security
    
Axeda Corporation
White Paper Published By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : 
mobile workers, mobile security, wireless security, mobile computing, mobility
    
Motorola
White Paper Published By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : 
wlan, wireless security, wireless freeloaders, wireless rogue, rogue
    
AirDefense
White Paper Published By: thawte     Published Date: Nov 06, 2006
Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.
Tags : 
security, security policies, network security, servers, windows server
    
thawte
White Paper Published By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management
    
IBM
White Paper Published By: IBM     Published Date: Apr 04, 2016
"Title/Main headline: IBM X-Force Threat Intelligence Quarterly - 4Q 2015 Sub Headline: How can your organization better prepare for a security incident? Blurb: 2015 has been a challenging year as insider threats, malware, and stealthy and mutating attacks have affected the threat landscape. Read the latest security research from IBM X-Force to learn: How low-level attacks can mask stealthier infiltrations The benefits of regularly maintained security procedures and response plans When patterns of irregularities can be the first indicators of compromise Call to Action/Action Statement: ""Download Now"" as the action statement"
Tags : 
ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management
    
IBM
White Paper Published By: IBM MaaS360     Published Date: Apr 15, 2015
Mobile device Management was just the beginning of enterprise security needs for iOS, Android, Windows and the ever expanding universe of devices. Data, Apps and access are what will send businesses into a new galaxy of great performance. Get there at safely light-speed with Enterprise Mobility Management.
Tags : 
fiberlink, mobile users, strategy, app enabled, scalability
    
IBM MaaS360
White Paper Published By: Windstream     Published Date: Mar 19, 2015
The following report will help you gain advantage through proactive use of network security.
Tags : 
windstream communications, network security, risk management, internet security
    
Windstream
White Paper Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management
    
CDW
Case Study Published By: Firehost     Published Date: Jan 07, 2015
This Case Study gives information on the 16 Infrastructure Components to pass your next Audit.
Tags : 
firehost, intelligent security, infraestructure, security, network security
    
Firehost
White Paper Published By: Globalscape     Published Date: Mar 21, 2014
This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short of these needs. The paper then describes how Globalscape's software-only solution. (WAFS) provides file replication and collaboration across globally dispersed networks, securely and reliably, with the performance of local file sharing.
Tags : 
file sharing, wan optimization, high bandwidth, low overhead, file replication
    
Globalscape
White Paper Published By: FireEye     Published Date: Feb 28, 2014
This whitepaper further educates you on the new security challenges for state and local governments.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature
    
FireEye
White Paper Published By: FireEye     Published Date: Feb 28, 2014
How are data centers becoming unwitting accomplices in advanced cyber attacks?
Tags : 
fireeye, persistent threats, advanced attacks, data centers, cyber-attacks
    
FireEye
White Paper Published By: FireEye     Published Date: Feb 28, 2014
Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.
Tags : 
fireeye, gartner research, cyber attacks, security posture, system exploitation
    
FireEye
White Paper Published By: Sponsored by HP and Intel ®     Published Date: Feb 21, 2013
HP CloudSystem Matrix enables organizations to realign traditional technology silos into virtual pools sharable by different applications and flexible enough to change as business needs evolve.
Tags : 
integrated, infrastructure, cloud it, public cloud, hybrid cloud
    
Sponsored by HP and Intel ®
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
In today's competitive business landscape, users' needs are continuously changing. Employees want access to their data and applications anytime, anywhere, from any device. The journey to seamlessly integrate data and applications across all devices begins with desktop modernization.
Tags : 
modernize, desktop, data, application, access
    
CDW Vmware
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
Your business counts on you for reliable, secure, responsive IT services. It's a nonstop job, with no time off to figure out complex new technologies or wrestle with software solutions designed for larger firms. Virtualization is the way to simplify your IT without unnecessary complexity or cost.
Tags : 
ebook, reliable, secure, simplify, infrastructure
    
CDW Vmware
White Paper Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper reviews the metrics and the technologies you should consider when migrating to the private cloud. Get your complimentary 10-page report now.
Tags : 
public, cloud, private, technologies, technology
    
Equinix
White Paper Published By: Citrix Systems     Published Date: Feb 18, 2012
This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Tags : 
virtualization, data center, datacenters, consolidate, network
    
Citrix Systems
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.