Whitepaper Library > Technology > Networking > Network Security
 

Network Security

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 326 - 350 of 433Sort Results By: Published Date | Title | Company Name
White Paper Published By: ScriptLogic     Published Date: Jan 11, 2012
In this white paper learn how to have a fluid help desk to work flow and how to resolve quickly and correctly, users IT issues. Read on.
Tags : 
network administration, network management, desktop management, desktop administration, active directory management
    
ScriptLogic
Webinar Published By: BMC     Published Date: Jan 09, 2012
The complexity of cloud computing warrants a unique approach to planning. See how BMC can help!
Tags : 
cloud computing, bmc, planning, initiative, computing
    
BMC
White Paper Published By: HP and Intel® Xeon® processors     Published Date: Nov 21, 2011
The cloud is the hottest thing in computing today, and enterprises are eagerly seeking to adopt it. Find out more...
Tags : 
cloud, cloud computing, private, public, hybrid
    
HP and Intel® Xeon® processors
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: TDi Technologies     Published Date: Aug 29, 2011
It's clear something is wrong. Business interruptions, outages, and other negative consequences happen far too often.
Tags : 
it infrastructure. it management, service levels, systems adminstrator, distributed computing, infrastructure
    
TDi Technologies
White Paper Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching
    
Avocent
White Paper Published By: File Transfer Consulting     Published Date: Jun 07, 2011
Examines IPv6 issues specific to file transfer applications, then tests 14 applications for readiness.
Tags : 
ipv6, managed file transfer, mft, file transfer, interoperability
    
File Transfer Consulting
White Paper Published By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : 
liaison, nubridges, lawrence c. miller, tokenization, cissp
    
Liaison Technologies
White Paper Published By: Qualys     Published Date: Apr 05, 2011
This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : 
it security, vulnerability management, risk management, qualysguard, risk optimization
    
Qualys
White Paper Published By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : 
virtualization, memory overcommitment, memory performance, memory reclamation, vmware
    
Kingston
White Paper Published By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
network security
    
Focus
White Paper Published By: M3 Consulting, Inc.     Published Date: Feb 03, 2011
Offshoring Is a Cost Effective Solution to Your IT Needs
Tags : 
software design, application development, web design, offshoring, it solutions
    
M3 Consulting, Inc.
White Paper Published By: NetIQ     Published Date: Jan 12, 2011
This white paper discusses the growing demand for IT security auditing and why current approaches-manual procedures, scripts, and network vulnerability scanners- fail.
Tags : 
netiq, automating it security, audit, compliance, data protection
    
NetIQ
White Paper Published By: Gartner, Inc     Published Date: Oct 28, 2010
New technologies emerge every day, but not all of them pay off, and adopting them too early might be risky for your organization.
Tags : 
emerging trends, emerging technologies, hype cycle, new technologies, it trends
    
Gartner, Inc
White Paper Published By: World Data Products, Inc.     Published Date: Oct 04, 2010
This three section white paper explains strategies on how to develop, apply, and maintain a security program.
Tags : 
world data products, secure network, security policies, monitoring and testing, monitoring
    
World Data Products, Inc.
White Paper Published By: xmannnnn     Published Date: Aug 06, 2010
Ultra High Speed Internet, TV and local/long distance phone services combined into 1 superior service.
Tags : 
active directory, bandwidth management, convergence, distributed computing, ethernet networking
    
xmannnnn
White Paper Published By: Webfishery     Published Date: Aug 03, 2010
This white paper explains how businesses can develop effective strategies to improve efficiency and reduce networking and application costs.
Tags : 
application management, white paper, bandwidth management, ethernet networking, gigabit networking
    
Webfishery
White Paper Published By: PC Mall     Published Date: Jul 09, 2010
Learn how to actively manage and reduce power consumption by using your network intelligently to realize significant cost savings.
Tags : 
pc mall, internet security, networking, wireless networking, network security
    
PC Mall
White Paper Published By: PC Mall     Published Date: Jul 08, 2010
Download this Cisco white paper to learn how to deliver a new workspace experience, connecting anyone, anywhere to any resource: securely, reliably and smoothly.
Tags : 
pcmall, internet security, networking, wireless networking, network security
    
PC Mall
White Paper Published By: Athena Security     Published Date: Jan 28, 2010
SIEM solutions detect real attacks from the thousands of events that are happening in the network. When an unexpected and potentially dangerous event is recognized, engineers take a quick (temporary) action to block the security leak, diagnose what really went wrong, determine what else is at risk, and decide on a fix.
Tags : 
firewalls, security, sim, siem, network security
    
Athena Security
White Paper Published By: GGR Communications     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
ggr communication, remote working, data security, remote desktop control, voip
    
GGR Communications
White Paper Published By: People for Business     Published Date: Jan 14, 2010
The paper explores the topic of remote working, the key considerations for implementing the solution and the implications from both an IT and an HR perspective.
Tags : 
people for business, remote working, data security, remote desktop control, voip
    
People for Business
White Paper Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Virtela is unique in its ability to meet these challenges for the enterprise participating on the global stage. This paper outlines the capabilities and benefits of Virtela's Global Service FabricSM.
Tags : 
virtela, business continuity, global service fabric, virtual network operator, vno
    
Virtela Communications, Inc.
White Paper Published By: Aventail     Published Date: Aug 21, 2009
The SSL VPN Buyer's Guide describes the 20 most important purchase requirements and 37 crucial questions you should ask before choosing an SSL VPN vendor.
Tags : 
buying guide, buyers guide, vpn purchase, ssl, vpn
    
Aventail
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.