Whitepaper Library > Technology > Networking > Network Security
 

Network Security

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 326 - 350 of 433Sort Results By:Published Date | Title | Company Name
White Paper Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Security Event Aggregation and Correlation Engine (N-SEAC) is a patented, key differentiator of the NitroSecurity IPS solution. It allows enterprise customers the ability to collect and analyze threat information more efficiently and in an accurate and timely manner.
Tags : 
intrusion prevention, ips, n-seac, intrusion detection, ids
    
NitroSecurity
White Paper Published By: NitroSecurity     Published Date: Aug 21, 2009
NitroSecurity's Active Network Response is a new security model that delivers network protection closer to the users at the network edge - stopping attacks before they can propagate throughout the network. 
Tags : 
network security, intrusion prevention, hackers, hacker detection, ips
    
NitroSecurity
White Paper Published By: PKWARE     Published Date: Aug 21, 2009
A security breach on a workhorse platform like a mainframe could be disastrous. Find out why PKWARE's SecureZIP is ideal for providing file security for data stored and transferred on mainframes.
Tags : 
mainframes, data security, database security, data archiving, data storage
    
PKWARE
White Paper Published By: PKWARE     Published Date: Aug 21, 2009
Regulatory and business requirements are driving the need for protecting information stored and transferred electronically. PKWARE provides an introduction to protecting your most valuable asset - your data.
Tags : 
regulatory compliance, compliance, information management, data security, data protection
    
PKWARE
White Paper Published By: Pointsec     Published Date: Aug 21, 2009
Strong security policy, procedures and technology are major requirements, especially for protecting the remote systems used for telework and the sensitive information stored on those devices.
Tags : 
network security, security policy, government, security policies, policy based security
    
Pointsec
White Paper Published By: Preventsys     Published Date: Aug 21, 2009
This paper is a synopsis of the presentations given at the Preventsys "CISO Breakfast Series," a succession of seminars given across North America in January and February 2005. The speakers for each breakfast consisted of security professionals and executives who provided their views on how to more effectively align information security with business initiatives.
Tags : 
network security, intrusion prevention, security management, business management, information management
    
Preventsys
White Paper Published By: Secure Computing     Published Date: Aug 21, 2009
This paper outlines the types of threats that leverage the Internet as a means of delivery and the risks that they pose to your organization. Learn the key drivers of a corporate security policy and how you can protect against HTTP-based threats using Web filtering as part of a multi-layered content security strategy.
Tags : 
security, anti spyware, malware prevention, malware, access control
    
Secure Computing
White Paper Published By: Secure Computing     Published Date: Aug 21, 2009
Unknown attacks are quickly becoming the next great information security challenge for today's organizations. Get up to speed on what these threats really are and learn what security measures are available to keep your network safe from these attacks.
Tags : 
security, patch management, security management, web service security, malware
    
Secure Computing
White Paper Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets
    
Sigaba
White Paper Published By: Third Brigade     Published Date: Aug 21, 2009
Healthcare organizations are being targeted by financially motivated attackers that steal and sell valuable data, including identities and computing resources. This white paper defines the new threat, and outlines three important steps that providers can take to protect their critical systems.
Tags : 
hipaa, hipaa compliance, network security, network security appliance, security management
    
Third Brigade
White Paper Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection
    
Third Brigade
White Paper Published By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : 
intrusion prevention, network security, ips, access control, hacker
    
TopLayer
White Paper Published By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : 
network security, intrusion prevention, ips, cso, server protection
    
TopLayer
White Paper Published By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : 
network management, network security, access control, nac, network access control
    
Trusted Network Tech
White Paper Published By: Tripwire     Published Date: Jun 30, 2009
Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.
Tags : 
tripwire, hipaa, security, provision, network
    
Tripwire
White Paper Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak
    
Trend Micro, Inc.
Webinar Published By: IBM     Published Date: Mar 04, 2009
This video will demonstrate some of the features of IBM Tivoli Identity Manager Express by taking you through a simple scenario. ITIM Express offers you the ability to set up approval workflows for account requests and ecertification. In this demonstration we will build an account request workflow that requires that all VPN accounts be approved by the requester’s supervisor.
Tags : 
ibm, tivoli identity manager, vpn, itim, approval workflows
    
IBM
White Paper Published By: ArcSight     Published Date: Mar 03, 2009
This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.
Tags : 
log management, security, fraud, insider threat, suspicious network activity
    
ArcSight
White Paper Published By: Cisco     Published Date: Jan 29, 2009
Wireless networking is an essential productivity tool for today's mobile workforce. With wireless networking, you and your employees can stay connected to your company's information resources virtually anytime, anywhere.
Tags : 
cisco, wireless networking, productivity tool, mobile workforce, router capacity
    
Cisco
Webinar Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 28, 2009
Small business VoIP, or voice over Internet Protocol, is getting a lot of attention these days. In essence, small business VoIP combines voice and data together on a single, secure network foundation. The following is a guide to why you might want to consider a small business VoIP system.
Tags : 
cisco, voip, small business voip, unified communications system, voice and data networks
    
Cisco
Webinar Published By: Cisco     Published Date: Jan 28, 2009
A secure network foundation from Cisco enables you to easily and cost-effectively add new users and applications as needed. In turn, this built-in flexibility helps your company stay competitive, react quickly to change, and expand to international markets, among other benefits. Here are some ways in which a secure Cisco network foundation can help you continue to enhance your company's productivity in the future.
Tags : 
cisco, secure network, wireless data connectivity, cisco smb, cost-effective network
    
Cisco
White Paper Published By: MessageLabs     Published Date: Jan 13, 2009
New spamming techniques are upon us -  419 spam, botnets, CAPTCHA cracking – what’s next from the 'bad guys'? Spam remains the biggest email-born threat to businesses. Learn how to protect your business.  FREE Whitepaper (PDF/40KB)
Tags : 
messagelabs, secure network, block spam, spamming techniques, spam
    
MessageLabs
White Paper Published By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008
Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…
Tags : 
secnap, network security, data security, compliance, osi
    
SECNAP Network Security Corporation
White Paper Published By: TriGeo Network Security     Published Date: Oct 03, 2008
Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.
Tags : 
trigeo network security, payment card industry (pci), data security standard (dss), networking, network security
    
TriGeo Network Security
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.