Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
White Paper Published By: Symantec
Published Date: Oct 20, 2014
In this report, we'll present the results of a 3rd party benchmark test that looks into how a few of the most respected solutions out there fared across five very real-world test scenarios to determine who really is the King of Scale. Read the benchmark report to learn more.
White Paper Published By: Aerohive
Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
White Paper Published By: Aerohive
Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
White Paper Published By: Aerohive
Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
White Paper Published By: Aerohive
Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
White Paper Published By: Aerohive
Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
White Paper Published By: Thawte
Published Date: Oct 06, 2014
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
White Paper Published By: Fireblade
Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Free Offer Published By: bitglass
Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
White Paper Published By: McAfee
Published Date: Aug 15, 2014
À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.
White Paper Published By: McAfee
Published Date: Aug 15, 2014
Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.
White Paper Published By: McAfee
Published Date: Aug 15, 2014
Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.
White Paper Published By: McAfee
Published Date: Aug 15, 2014
As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.
White Paper Published By: McAfee
Published Date: Aug 14, 2014
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
White Paper Published By: McAfee
Published Date: Aug 14, 2014
When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.
White Paper Published By: McAfee
Published Date: Aug 14, 2014
What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.
Free Offer Published By: Citrix
Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
White Paper Published By: Citrix
Published Date: Jul 25, 2014
After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.
White Paper Published By: Citrix
Published Date: Jul 25, 2014
According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Free Offer Published By: Lancope
Published Date: Jun 21, 2014
Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.
White Paper Published By: Palo Alto Networks
Published Date: Jun 19, 2014
The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
White Paper Published By: Palo Alto Networks
Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world
attacks and APTs, the shortcomings of legacy security solutions,
the capabilities of next-generation firewalls, and security best
practices.
White Paper Published By: Kaspersky
Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Add Research
Get your company's research in the hands of targeted business professionals.