"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Network Security

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 51 - 75 of 433Sort Results By: Published Date | Title | Company Name
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.
Tags : 
citrix, cyberthreat, report, defense, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Take a deep dive into survey data and findings, learn about the evolution of cyberthreats, and find out how you can prepare for cyberattacks in 2015.
Tags : 
citrix, cyberthreat defense, report, 2015, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Read this paper to learn how NetScaler is meeting modern demands for more robust datacenter security.
Tags : 
citrix, netscaler, security, data center, cloud
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The mobile web doesn’t just exist in your smartphone or tablet’s browser—there’s also an invisible but critical layer at the back end that powers mobile app services from content delivery to networking and collaboration.
Tags : 
citrix, netscaler, security, mobile, applications
    
Citrix Systems, Inc.
Free Offer Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.
Tags : 
citrix, waf, firewall, tco, security
    
Citrix Systems, Inc.
White Paper Published By: Cisco     Published Date: Jan 05, 2016
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions
Tags : 
cisco, next gen buyer, guide, network security, solutions
    
Cisco
White Paper Published By: Cisco     Published Date: Dec 04, 2015
IT should not impede your business growth, but rather should accelerate it.
Tags : 
cisco, network, business growth, virtual network, network management
    
Cisco
White Paper Published By: Cisco     Published Date: Dec 04, 2015
Group video systems primarily serve the need for high-quality video interaction across a range of meeting room sizes.
Tags : 
video, system, high quality interaction, sip, network management
    
Cisco
White Paper Published By: TheMarketingScope     Published Date: Nov 19, 2015
In this white paper, we will provide an overview of the present state of mobility in the enterprise and identify loopholes and key areas of concern for the Public Sector.
Tags : 
byod, mobile devices, mobile workers, smartphones, mobile computing
    
TheMarketingScope
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
We have created the Ultimate Guide to Understanding the Cloud to help you better decipher the many aspects of cloud computing. Download the eBook and understand what the cloud is and the various service and deployment models available to you.
Tags : 
cloud, hosting, managed hosting, disaster recovery, saas
    
INetU Managed Hosting
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
By moving to the cloud technology company, VIIAD, reduced its costs by 50%. Read this Cloud Computing article to see how you can do the same by learning the 6 lessons that were learned when moving applications to the cloud.
Tags : 
cloud, hosting, managed hosting, private cloud, roi
    
INetU Managed Hosting
White Paper Published By: INetU Managed Hosting     Published Date: Oct 09, 2015
The way attackers are going after corporate data and infrastructure these days means that it’s not a matter of if, but when you’ll be forced to buy a ticket for the post-breach rollercoaster. But a little preparation and planning can go a long way toward making the ride as manageable and inexpensive as possible. This eBook walks you through how to get started on planning and executing an incident response for your business.
Tags : 
data breach, cyber-attack, cloud, post-breach, breach
    
INetU Managed Hosting
White Paper Published By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : 
network defense, hacking, detecting threats, security, network security
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 08, 2015
Cisco can help you get there, using capabilities embedded in the network you already have in place. And it is as easy as 1+1=2
Tags : 
simplifying your network, cisco visual network, ethernet networking, gigabit networking, governance
    
Cisco
White Paper Published By: Sophos     Published Date: Oct 07, 2015
This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.
Tags : 
unified threat management, firewalls, utm, firewall solutions, security
    
Sophos
White Paper Published By: IBM     Published Date: Oct 06, 2015
Discover how to use behavior-based protection strategies to help disrupt mutating threats in real time, looking at how integrated, intelligent solutions from IBM can detect and help prevent attacks - from the network perimeter to remote endpoints.
Tags : 
behavior based protection, behavior based protection strategy, ibm, data protection, network protection
    
IBM
White Paper Published By: VMware     Published Date: Oct 05, 2015
Unless you’ve already deployed a Zero Trust network, your network security is broken. That’s the bad news. The good news? New ways of implementing a previously hardware-intensive and costly concept called micro-segmentation now put Zero Trust within your organization’s reach. Learn about these breakthrough developments in this Forrester Research report that is yours free, courtesy of VMware and Carahsoft®. Download your free copy now.
Tags : 
vmware, zero trust, forrester research, network security, network security solution
    
VMware
White Paper Published By: VMware     Published Date: Oct 05, 2015
Learn how this city government deployed VMware vCloud Air Disaster Recovery® to meet its recovery point objectives and VMware NSX® to add security layers inside the organization for increased protection. Get your free download of this case study now.
Tags : 
vmware, vmware vcloud air disaster recovery, vmware nsx, avondale, arizona
    
VMware
Webinar Published By: Aerohive     Published Date: Sep 25, 2015
Testez par vous-même l’éventail complet des fonctionnalités d’un point d’accès Aerohive. Assistez à ce webinaire le jeudi 8 octobre 2015 à 11 h CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Webinar Published By: Aerohive     Published Date: Sep 25, 2015
DONNERSTAG 8. OKTOBER 2015 UM 11:00 UHR
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Webinar Published By: Aerohive     Published Date: Sep 25, 2015
Experience first-hand the full feature set of an Aerohive Access Point. Attend this webinar on Thursday 8 October 2015 at 11:00 CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Webinar Published By: Aerohive     Published Date: Sep 25, 2015
SIMPLI-FI ENTERPRISE NETWORKING THURSDAY 8 OCTOBER 2015 AT 11:00 BST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
Webinar Published By: Aerohive     Published Date: Sep 18, 2015
SIMPLI-FI ENTERPRISE NETWORKING THURSDAY 8 OCTOBER 2015 AT 11:00 AEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
White Paper Published By: Cisco     Published Date: Sep 16, 2015
Comparisons to the invention of the printing press and Gutenberg’s Bible might be slightly exaggerated—but only slightly. The era of the Internet of Everything (IoE) is upon us and IoE will inevitably change the way companies operate. But too much of the discussion about IoE glosses over the skills and capabilities required of data engineering.
Tags : 
unified computing system, virtualization, networking, storage, convergence
    
Cisco
White Paper Published By: Kaspersky     Published Date: Aug 27, 2015
Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.
Tags : 
kaspersky, attacks, cyberattacks, business process, security costs
    
Kaspersky
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory