"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Network Security

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 301 - 325 of 434Sort Results By: Published Date | Title | Company Name
White Paper Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.
Tags : 
watchguard technologies, cloud-based security, protection, network security, malware threats
    
WatchGuard Technologies
White Paper Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus
    
Rapid7
White Paper Published By: iboss     Published Date: Jan 22, 2018
On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.
Tags : 
iboss, remote access, byod, cybersecurity, mobile workforce
    
iboss
White Paper Published By: Windstream     Published Date: Mar 19, 2015
The following report will help you gain advantage through proactive use of network security.
Tags : 
windstream communications, network security, risk management, internet security, security management
    
Windstream
White Paper Published By: Kaspersky     Published Date: Oct 26, 2016
Download Kaspersky Lab’s Security in the Cloud Snapshot* to learn about the most pressing cloud security issues and how you can address them.
Tags : 
kaspersky, cloud security, critical operations, endpoint security, network security
    
Kaspersky
Free Offer Published By: Citrix     Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
Tags : 
network security, application security, best practices, software compliance
    
Citrix
White Paper Published By: McAfee     Published Date: Aug 14, 2014
Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall
    
McAfee
White Paper Published By: Third Brigade     Published Date: May 25, 2007
This white paper identifies twelve critical questions that organizations need to consider when selecting a Host Intrusion Prevention System product. These questions relate to protection, manageability, integration and speed.
Tags : 
host ips, ips, hips, intrusion prevention, vendor selection
    
Third Brigade
White Paper Published By: Blue Lane     Published Date: Apr 03, 2007
One of the biggest challenges mirrors a problem in the physical server world: security patching. This paper describes in greater detail the benefits and challenges of server virtualization, and offers insight into how Blue Lane customers are utilizing the PatchPoint(r) System to combat the threat of software vulnerabilities.
Tags : 
virtualization, patching, security, vmware, network security
    
Blue Lane
White Paper Published By: McAfee     Published Date: Aug 15, 2014
As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada
    
McAfee
Webinar Published By: Aerohive     Published Date: Sep 25, 2015
Testez par vous-même l’éventail complet des fonctionnalités d’un point d’accès Aerohive. Assistez à ce webinaire le jeudi 8 octobre 2015 à 11 h CEST
Tags : 
wi fi security, security policies, cloud security, on-boarding of users, aerohive access point
    
Aerohive
White Paper Published By: Shavlik Technologies     Published Date: Dec 15, 2010
View this white paper to get a complete list of products that Shavlik covers.
Tags : 
shavlik, 3rd party application, custom patching, microsoft operating system, wsus
    
Shavlik Technologies
White Paper Published By: Shavlik Technologies     Published Date: Dec 15, 2010
Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.
Tags : 
shavlik, security suite, virtual machine, legacy windows platform, third-party application
    
Shavlik Technologies
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
Your business counts on you for reliable, secure, responsive IT services. It's a nonstop job, with no time off to figure out complex new technologies or wrestle with software solutions designed for larger firms. Virtualization is the way to simplify your IT without unnecessary complexity or cost.
Tags : 
ebook, reliable, secure, simplify, infrastructure
    
CDW Vmware
White Paper Published By: Cisco     Published Date: Dec 04, 2015
IT should not impede your business growth, but rather should accelerate it.
Tags : 
cisco, network, business growth, virtual network, network management
    
Cisco
White Paper Published By: Cisco     Published Date: Oct 08, 2015
Cisco can help you get there, using capabilities embedded in the network you already have in place. And it is as easy as 1+1=2
Tags : 
simplifying your network, cisco visual network, ethernet networking, gigabit networking, governance
    
Cisco
White Paper Published By: Cisco     Published Date: Jan 28, 2009
Small business VoIP, or voice over Internet Protocol, is getting a lot of attention these days. In essence, small business VoIP combines voice and data together on a single, secure network foundation. The following is a guide to why you might want to consider a small business VoIP system.
Tags : 
cisco, voip, small business voip, unified communications system, voice and data networks
    
Cisco
White Paper Published By: AirDefense     Published Date: Apr 24, 2007
This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.
Tags : 
wlan, wireless security, wireless freeloaders, wireless rogue, rogue
    
AirDefense
White Paper Published By: TDi Technologies     Published Date: Aug 29, 2011
It's clear something is wrong. Business interruptions, outages, and other negative consequences happen far too often.
Tags : 
it infrastructure. it management, service levels, systems adminstrator, distributed computing, infrastructure
    
TDi Technologies
White Paper Published By: VeriSign     Published Date: Feb 10, 2011
In this must read white paper, you will learn about the new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication and how you can help prevent it.
Tags : 
verisign, spoofing server, server communication, ssl, data security breach
    
VeriSign
White Paper Published By: HP and Intel® Xeon® processors     Published Date: Nov 21, 2011
The cloud is the hottest thing in computing today, and enterprises are eagerly seeking to adopt it. Find out more...
Tags : 
cloud, cloud computing, private, public, hybrid
    
HP and Intel® Xeon® processors
White Paper Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud
    
IBM
White Paper Published By: Thawte     Published Date: Oct 06, 2014
Learn about how digital certificates with SGC technology are able to step-up encryption levels for certain browsers to 128-bits. A discussion of the business benefits of deploying SGC certificates is also included.
Tags : 
network security, encryption
    
Thawte
Webinar Published By: NetIQ     Published Date: Dec 08, 2011
"Stop the Breach before It Happens: Easy, Smart, and Powerful Security Management Solutions" presented by Garve Hays:
Tags : 
security, breach, management, security management, event
    
NetIQ
Webinar Published By: HP     Published Date: Jul 29, 2008
Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.
Tags : 
mission critical, security, datacenter, data center, storage security
    
HP
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory