Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 151 - 175 of 317Sort Results By: Published Date | Title | Company Name
By: Safenet     Published Date: Oct 11, 2010

High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?

Tags : safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management
By: SafeNet     Published Date: Oct 06, 2010

Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.

Tags : safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
By: SafeNet     Published Date: Oct 06, 2010

High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?

Tags : safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management
By: Brocade     Published Date: Sep 07, 2010

This research study investigates industry best practices for mul-site and campus-area Wireless LANs (WLANs),based on a recent survey of 163 organizations.

Tags : wlan, wireless lan, wireless network performance, wireless network security, wlan security, higher education, healthcare, network performance
By: IBM Software     Published Date: Aug 04, 2010

Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code.

Tags : ibm ouncelab, network security, security management, security standards, service-oriented architecture, windows xp, business operations, security
By: HP     Published Date: Aug 04, 2010

Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.

Tags : security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
By: WatchGuard Technologies     Published Date: Apr 21, 2010

Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.

Tags : watchguard technologies, cloud-based security, protection, network security, malware threats, cybercriminal, anti spam, anti spyware
By: ESET     Published Date: Feb 17, 2010

This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.

Tags : eset, endpoint security, networkwide platform, integrated security management, heuristic scanning, antimalware, enterprise security, network security
By: Microsoft Windows Phone     Published Date: Feb 05, 2010

Part 1 - Windows mobile security: Get it locked down. Security for Windows Mobile is a very real concern that cannot be ignored. Learn about the risks connected with mobile devices and some organizational must-haves in this tip.

Tags : microsoft, windows phone, mobile security, network security, smartphone, wireless, smart phones, wireless phones
By: Microsoft Windows Phone     Published Date: Feb 05, 2010

Part 2 - Security tools that can boost Windows mobile security. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.

Tags : microsoft, windows phone, mobile security, security tools, smartphone, network security, antivirus, backup
By: Microsoft Windows Phone     Published Date: Feb 05, 2010

Part 3 - Free security testing tools for Windows handheld devices. With these no-cost security testing tools, you can check network security from Windows handheld devices.

Tags : microsoft, windows phone, mobile security, free security testing tool, networking, wireless network connection, smart phones, pdas
By: Virtela Communications, Inc.     Published Date: Nov 16, 2009

Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.

Tags : virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network
By: Webroot UK     Published Date: Nov 11, 2009

This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.

Tags : webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration
By: IBM     Published Date: Sep 11, 2009

Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.

Tags : ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions, convergence, network management
By: Tripwire     Published Date: Jun 30, 2009

Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.

Tags : tripwire, hipaa, security, provision, network, health, company, system
By: Trend Micro, Inc.     Published Date: Apr 29, 2009

The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.

Tags : trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
By: ArcSight     Published Date: Mar 03, 2009

This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.

Tags : log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox
By: Cisco     Published Date: Jan 29, 2009

Wireless networking is an essential productivity tool for today's mobile workforce. With wireless networking, you and your employees can stay connected to your company's information resources virtually anytime, anywhere.

Tags : cisco, wireless networking, productivity tool, mobile workforce, router capacity, access point, secure network, control systems
By: Cisco     Published Date: Jan 28, 2009

Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.

Tags : cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
By: Cisco     Published Date: Jan 28, 2009

Small business VoIP, or voice over Internet Protocol, is getting a lot of attention these days. In essence, small business VoIP combines voice and data together on a single, secure network foundation. The following is a guide to why you might want to consider a small business VoIP system.

Tags : cisco, voip, small business voip, unified communications system, voice and data networks, secure network foundation, networking, network security
By: Cisco     Published Date: Jan 28, 2009

A secure network foundation from Cisco enables you to easily and cost-effectively add new users and applications as needed. In turn, this built-in flexibility helps your company stay competitive, react quickly to change, and expand to international markets, among other benefits. Here are some ways in which a secure Cisco network foundation can help you continue to enhance your company's productivity in the future.

Tags : cisco, secure network, wireless data connectivity, cisco smb, cost-effective network, video conferencing, productivity benefits, security
By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008

Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…

Tags : secnap, network security, data security, compliance, osi, malware, antispam, anti-spam
By: TriGeo Network Security     Published Date: Oct 03, 2008

Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.

Tags : trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, compliance, security management
By: TriGeo Network Security     Published Date: Oct 03, 2008

It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.

Tags : trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
By: MessageLabs     Published Date: Sep 22, 2008

In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.

Tags : botnet, bot, messagelabs, email security, malware, virus, security, network security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End

Related IT Whitepaper Topics

Access Control
689 Documents
Active Directory
175 Documents
Anti Spam
557 Documents
Anti Spyware
590 Documents
Anti Virus
639 Documents
Application Security
798 Documents
356 Documents
112 Documents
Business Continuity
384 Documents
Cisco Certification
13 Documents
Cloud Computing
978 Documents
123 Documents
Colocation and Web Hosting
247 Documents
Data Center Design and Management
618 Documents
184 Documents
Disaster Recovery
503 Documents
Email Security
589 Documents
453 Documents
Ethernet Networking
189 Documents
393 Documents
Hacker Detection
462 Documents
873 Documents
Internet Security
896 Documents
Intrusion Detection
592 Documents
Intrusion Prevention
653 Documents
156 Documents
88 Documents
Local Area Networking
232 Documents
Microsoft Exchange
131 Documents
Mobile Computing
533 Documents
Network Architecture
457 Documents
Network Management
674 Documents
Network Performance Management
406 Documents
Network Provisioning
220 Documents
Network Security Appliance
358 Documents
Password Management
210 Documents
117 Documents
196 Documents
120 Documents
Remote Access
297 Documents
Remote Network Management
250 Documents
Risk Management
300 Documents
Secure Instant Messaging
177 Documents
Security Management
1009 Documents
Security Policies
408 Documents
506 Documents
Single Sign On
140 Documents
Small Business Networks
284 Documents
227 Documents
System Management Software
159 Documents
TCP/IP Protocol
180 Documents
Total Cost of Ownership
259 Documents
150 Documents
Web Service Security
374 Documents
108 Documents
Windows Server
124 Documents
Wireless Application Software
229 Documents
Wireless Security
265 Documents
Wireless Service Providers
126 Documents
78 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.