Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 151 - 175 of 330Sort Results By: Published Date | Title | Company Name
By: Shavlik Technologies     Published Date: Apr 14, 2011

How can an organization manage both their physical environment and their virtual environment without doubling up on the work, missing critical patches on offline virtual machines, or even missing patches on the virtual machines they are not even aware of?

Tags : shavlik, patch management, virtual machine, physical, network patching, lifecycle management, attack, risk
    
By: Dell SecureWorks     Published Date: Apr 11, 2011

Read this whitepaper to understand how Dell SecureWorks can help your midsize organization improve security, increase operational efficiency and demonstrate compliance with regulatory requirements, allowing you to focus on the priorities and strategic projects that drive your business.

Tags : dell secureworks, internet security, compliance, regulatory compliance, vulnerability, security intelligence, global threats, cyber attack
    
By: Dell SecureWorks     Published Date: Apr 09, 2011

Read this whitepaper to learn how Dell SecureWorks' multi-phase Penetration testing can help you obtain a true understanding of your security and risk posture so that you can strengthen your defenses and prevent a successful attack.

Tags : intrusion prevention, dell, secureworks, attacks, network security, cyber risk, cyberrisk, penetration
    
By: GFI Software     Published Date: Apr 05, 2011

GFI LANguard provides a complete network security overview with minimal administrative effort. Why use GFI LANguard? Download this free trial to experience the benefits!

Tags : gfi software, languard, free trial, network security scanner, vulnerability management tool, network auditing, automated patching, network security
    
By: Symantec.cloud     Published Date: Mar 02, 2011

The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.

Tags : symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop
    
By: VeriSign     Published Date: Feb 10, 2011

In this must read white paper, you will learn about the new advances in attacks that exploit weaknesses of generic SSL to compromise server-server communication and how you can help prevent it.

Tags : verisign, spoofing server, server communication, ssl, data security breach, network security, enterprise network, internet security
    
By: Lumension     Published Date: Feb 04, 2011

With cyberattacks inflicting increasingly greater damage following uncontrolled connection, it's time that government organizations got serious about outside threats.

Tags : usb security, network security, patch management, lumension, device management, security, intrusion prevention, mobile workers
    
By: Astaro     Published Date: Jan 19, 2011

Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.

Tags : astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
By: Astaro     Published Date: Jan 19, 2011

Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.

Tags : astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management
    
By: Shavlik Technologies     Published Date: Dec 15, 2010

Shavlik Security Suite can patch online and offline virtual machines; works both with an agent-based or agentless approach; supports legacy Windows platforms and a wide range of Microsoft and third-party applications; and furthermore provides strong control of scanning options, and a level of automated remediation that is impressive.

Tags : shavlik, security suite, virtual machine, legacy windows platform, third-party application, protection management, automated discovery, scanning
    
By: Shavlik Technologies     Published Date: Dec 15, 2010

View this white paper to get a complete list of products that Shavlik covers.

Tags : shavlik, 3rd party application, custom patching, microsoft operating system, wsus, adobe, apple, infrastructure
    
By: Shavlik Technologies     Published Date: Dec 15, 2010

Fortunately, Shavlik Technologies takes the sting out of the patch management process, while at the same time accelerating and continuously improving security and compliance readiness.

Tags : shavlik, patch management, security vulnerabilities, compliance, networking, automation, network security, network security appliance
    
By: Safenet     Published Date: Oct 11, 2010

Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.

Tags : safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
By: Safenet     Published Date: Oct 11, 2010

High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?

Tags : safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management
    
By: SafeNet     Published Date: Oct 06, 2010

Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.

Tags : safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
By: SafeNet     Published Date: Oct 06, 2010

High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?

Tags : safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management
    
By: Brocade     Published Date: Sep 07, 2010

This research study investigates industry best practices for mul-site and campus-area Wireless LANs (WLANs),based on a recent survey of 163 organizations.

Tags : wlan, wireless lan, wireless network performance, wireless network security, wlan security, higher education, healthcare, network performance
    
By: IBM Software     Published Date: Aug 04, 2010

Hear from Security Executive, Jack Danahy, of IBM's Rational Software Group explain why and how to hold your outsourced partners accountable to delivering secure code.

Tags : ibm ouncelab, network security, security management, security standards, service-oriented architecture, windows xp, business operations, security
    
By: HP     Published Date: Aug 04, 2010

Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.

Tags : security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
    
By: WatchGuard Technologies     Published Date: Apr 21, 2010

Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.

Tags : watchguard technologies, cloud-based security, protection, network security, malware threats, cybercriminal, anti spam, anti spyware
    
By: ESET     Published Date: Feb 17, 2010

This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET's solution for integrated security management that is built around its advanced heuristic technology.

Tags : eset, endpoint security, networkwide platform, integrated security management, heuristic scanning, antimalware, enterprise security, network security
    
By: Microsoft Windows Phone     Published Date: Feb 05, 2010

Part 1 - Windows mobile security: Get it locked down. Security for Windows Mobile is a very real concern that cannot be ignored. Learn about the risks connected with mobile devices and some organizational must-haves in this tip.

Tags : microsoft, windows phone, mobile security, network security, smartphone, wireless, smart phones, wireless phones
    
By: Microsoft Windows Phone     Published Date: Feb 05, 2010

Part 2 - Security tools that can boost Windows mobile security. Take a look at this list of security tools, as put together by Windows security expert Kevin Beaver.

Tags : microsoft, windows phone, mobile security, security tools, smartphone, network security, antivirus, backup
    
By: Microsoft Windows Phone     Published Date: Feb 05, 2010

Part 3 - Free security testing tools for Windows handheld devices. With these no-cost security testing tools, you can check network security from Windows handheld devices.

Tags : microsoft, windows phone, mobile security, free security testing tool, networking, wireless network connection, smart phones, pdas
    
By: Virtela Communications, Inc.     Published Date: Nov 16, 2009

Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.

Tags : virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End

Related IT Whitepaper Topics

Access Control
691 Documents
Active Directory
175 Documents
Anti Spam
572 Documents
Anti Spyware
608 Documents
Anti Virus
653 Documents
Application Security
821 Documents
Authentication
363 Documents
Biometrics
112 Documents
Business Continuity
384 Documents
Cisco Certification
13 Documents
Cloud Computing
1003 Documents
Clustering
119 Documents
Colocation and Web Hosting
248 Documents
Data Center Design and Management
629 Documents
DDoS
185 Documents
Disaster Recovery
504 Documents
Email Security
586 Documents
Encryption
456 Documents
Ethernet Networking
189 Documents
Firewalls
399 Documents
Hacker Detection
462 Documents
Infrastructure
888 Documents
Internet Security
914 Documents
Intrusion Detection
598 Documents
Intrusion Prevention
665 Documents
IPSec
156 Documents
Linux
88 Documents
Local Area Networking
232 Documents
Microsoft Exchange
131 Documents
Mobile Computing
561 Documents
Network Architecture
463 Documents
Network Management
683 Documents
Network Performance Management
421 Documents
Network Provisioning
220 Documents
Network Security Appliance
361 Documents
Password Management
213 Documents
PDA
122 Documents
Phishing
196 Documents
PKI
120 Documents
Remote Access
304 Documents
Remote Network Management
254 Documents
Risk Management
312 Documents
Secure Instant Messaging
177 Documents
Security Management
1030 Documents
Security Policies
417 Documents
Servers
506 Documents
Single Sign On
140 Documents
Small Business Networks
285 Documents
SSL
228 Documents
System Management Software
159 Documents
TCP/IP Protocol
180 Documents
Total Cost of Ownership
261 Documents
Tunneling
150 Documents
Web Service Security
375 Documents
WiFi
114 Documents
Windows Server
124 Documents
Wireless Application Software
234 Documents
Wireless Security
269 Documents
Wireless Service Providers
126 Documents
WLAN
80 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.