Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 151 - 175 of 306Sort Results By: Published Date | Title | Company Name
By: Webroot UK     Published Date: Nov 11, 2009

This paper considers how Web-based security threats are evolving, within the context of IT trends including mobile, home computing and other forms of remote access that could all potentially increase the attack surface of the organization.

Tags : webroot, web security threat, phishing, antivirus, ddos, data leak, threat protection, configuration
    
By: IBM     Published Date: Sep 11, 2009

Listen to IBM Internet Security Systems' take on network security convergence. This presentation will be available to audience members until February 22, 2010 at 09:00 AM Pacific Standard Time.

Tags : ibm, webcast, network security convergence, web 2.0, web application and database threats, security solutions, convergence, network management
    
By: Tripwire     Published Date: Jun 30, 2009

Find out whether your health company's network systems are well enough to pass an internal security checkup, or are running the risk of a much more invasive examination by federal regulators and plaintiff's lawyers.

Tags : tripwire, hipaa, security, provision, network, health, company, system
    
By: Ixia Network Visibility Solutions     Published Date: Jun 29, 2009

As networks, security threats, and other requirements increase in complexity, monitoring of enterprise infrastructures has become a difficult yet crucial exercise. Monitoring Optimization, a new solution for making sense of the chaos, has emerged as an ideal solution for maximizing network coverage and maintaining optimal utilization of hardware monitoring tools. However, there is a third variable at play - the productivity of the staff responsible for managing monitoring, a staff that is shrinking in the wake of layoffs. This brief reviews how important the third variable is, and how Monitoring Optimization is the only solution to manage all three variables.

Tags : anue, networks, security threats, enterprise infrastructures, optimization, network security, sla, networking
    
By: Ixia Network Visibility Solutions     Published Date: Jun 29, 2009

This White Paper reviews the threats before us and the challenges those offer, the best way to solve these problems, and what return-on-investment can be expected for such a solution. Learn more today!

Tags : anue, return-on-investment, roi, security, optimization, network, network security, data security
    
By: Trend Micro, Inc.     Published Date: Apr 29, 2009

The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.

Tags : trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
By: ArcSight     Published Date: Mar 03, 2009

This document provides an overview of the drivers for Log Management scalability and outlines the key requirements to consider as part of the evaluation process.

Tags : log management, security, fraud, insider threat, suspicious network activity, pci dss, hipaa, sox
    
By: Cisco     Published Date: Jan 29, 2009

Wireless networking is an essential productivity tool for today's mobile workforce. With wireless networking, you and your employees can stay connected to your company's information resources virtually anytime, anywhere.

Tags : cisco, wireless networking, productivity tool, mobile workforce, router capacity, access point, secure network, control systems
    
By: Cisco     Published Date: Jan 28, 2009

Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.

Tags : cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
    
By: Cisco     Published Date: Jan 28, 2009

Small business VoIP, or voice over Internet Protocol, is getting a lot of attention these days. In essence, small business VoIP combines voice and data together on a single, secure network foundation. The following is a guide to why you might want to consider a small business VoIP system.

Tags : cisco, voip, small business voip, unified communications system, voice and data networks, secure network foundation, networking, network security
    
By: Cisco     Published Date: Jan 28, 2009

A secure network foundation from Cisco enables you to easily and cost-effectively add new users and applications as needed. In turn, this built-in flexibility helps your company stay competitive, react quickly to change, and expand to international markets, among other benefits. Here are some ways in which a secure Cisco network foundation can help you continue to enhance your company's productivity in the future.

Tags : cisco, secure network, wireless data connectivity, cisco smb, cost-effective network, video conferencing, productivity benefits, security
    
By: SECNAP Network Security Corporation     Published Date: Oct 07, 2008

Politics, Religion and Economics exert enormous influence on decision-making and the integrity of IT programs—and often result in sub-par decisions that open the door to malicious intrusion or attack.  Michael Scheidell and his talented technical team know how difficult it can be to create positive change in an organization, even when obvious vulnerabilities exist.  When it comes to navigating the executive suite and undocumented layers of the OSI model, the staff at SECNAP® Network Security have the experience to assist IT management in developing effective strategies to successfully drive security improvements.   Download This Paper Now…

Tags : secnap, network security, data security, compliance, osi, malware, antispam, anti-spam
    
By: TriGeo Network Security     Published Date: Oct 03, 2008

Simply deploying a security solution cannot guarantee meeting every Payment Card Industry (PCI) requirement in full. This whitepaper discusses the challenges of PCI compliance and how security information and event management (SIEM) provides the data visibility, log management, end-point security and active response needed to demonstrate and meet each of the 12 PCI compliance requirements.

Tags : trigeo network security, payment card industry (pci), data security standard (dss), networking, security, network security, compliance, security management
    
By: TriGeo Network Security     Published Date: Oct 03, 2008

It’s widely accepted that Security Information and Event Management (SIEM) systems are excellent tools for regulatory compliance, log management and analysis, trouble-shooting and forensic analysis. What’s surprising to many is that this technology can play a significant role in actively defending networks. This whitepaper explains precisely how real-time analysis, combined with in-memory correlation, and automated notification and remediation capabilities can provide unprecedented network visibility, security and control.

Tags : trigeo whitepaper, siem, log management, security event management, automated remediation, active response, correlation, compliance
    
By: MessageLabs     Published Date: Sep 22, 2008

In this whitepaper, get a detailed look at dangerous robot networks or “botnets,” such as Sobig, StormWorm and MayDay. Understand how their creators are constantly evolving these threats to prevent detection by traditional forms of security. Finally, learn how the MessageLabs solution provides unique protection against botnets.

Tags : botnet, bot, messagelabs, email security, malware, virus, security, network security
    
By: MessageLabs     Published Date: Sep 17, 2008

Social and business networking sites are changing the way people talk online. Sites like Facebook, MySpace and Bebo help friends stay in touch while LinkedIn and Plaxo mainly connect business users. They are very popular but present new challenges to IT managers. They seem to have come out of nowhere. For example, Facebook currently has 70m users, 40% of which are located in the US.  The rapid growth of such sites is part of the problem. Companies risk being caught off guard.  Learn how to protect your business from threats posed by online social networking in this 7 Step Guide for IT Managers.

Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs
    
By: HP     Published Date: Jul 29, 2008

Connect to this special web event to hear from Forrester Research and HP on how to address key vulnerabilities in the storage network, receive tips and recommendations on selecting and implementing data storage encryption solutions and details on how to achieve centralized key management and data encryption where it matters most.

Tags : mission critical, security, datacenter, data center, storage security, storage, network security, encryption
    
By: Javelin Strategy & Research     Published Date: Jul 02, 2008

Javelin Strategy & Research has released a study covering data breach victims, which highlights the acute awareness among consumers about data security and the significant implications security breaches represent to businesses once consumer trust is compromised. Read this report, which also reveals Javelin's recommendations to institutions to address consumer security concerns and expectations in the event of a data breach.

Tags : javelin, debix, customer service, customer experience, damage control, data breach, security breach, network security
    
By: Clearswift     Published Date: Jun 09, 2008

Anyone who spends any time online cannot have failed to notice. People are using the Web in new ways; ways that make the 'brochureware' of the early Web experience look and feel decidedly flat. It's a new world, characterised by a wave of new jargon, brands and web based experiences. MySpace. FaceBook.  Wikipedia. Flickr. Twitter. YouTube. Mashups. Blogs. Newsfeeds. Download this white paper for a simple guide to the terms, opportunities and threats that Web 2.0 poses.

Tags : internet security, web 2, web 2.0, clearswift, social media, social networking, facebook, myspace
    
By: Clearswift     Published Date: Jun 09, 2008

This white paper provides a comprehensive look at spam; from its early days to where we are today in terms of managing the daily threats.  With a strong policy, education and policy enforcement, and a multi-layer content security solution, organizations can address every kind of threat to its networks and its business; regardless of whether the threats are inbound or outbound.

Tags : clearswift, network security, internet security, web security, anti spam
    
By: Clearswift     Published Date: Jun 09, 2008

In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.

Tags : data protection, clearswift, data management, network security
    
By: Clearswift     Published Date: Jun 09, 2008

Websites that did not exist five years ago are now at the top of the most visited and used sites on the Web.  Yesterday's teenagers and college students, who have grown up using MySpace, YouTube and other Web 2.0 sites are bringing their social habits into the workplace, and creating a number of challenges for employers.

Tags : enterprise security, web 2.0, gartner, clearswift, clearswift, social media, social networking, network security
    
By: MX Logic     Published Date: May 21, 2008

Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.

Tags : botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm
    
By: MX Logic     Published Date: May 21, 2008

In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.

Tags : managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections
    
By: Burton Group     Published Date: Apr 08, 2008

In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.

Tags : burton group, best practices, malware, security, email security, network security, content filtering, intrusion detection
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End

Related IT Whitepaper Topics

Access Control
811 Documents
Active Directory
165 Documents
Anti Spam
546 Documents
Anti Spyware
588 Documents
Anti Virus
647 Documents
Application Security
892 Documents
Authentication
352 Documents
Biometrics
103 Documents
Business Continuity
378 Documents
Cisco Certification
13 Documents
Cloud Computing
877 Documents
Clustering
110 Documents
Colocation and Web Hosting
230 Documents
Data Center Design and Management
562 Documents
DDoS
171 Documents
Disaster Recovery
496 Documents
Email Security
612 Documents
Encryption
462 Documents
Ethernet Networking
180 Documents
Firewalls
391 Documents
Hacker Detection
502 Documents
Infrastructure
831 Documents
Internet Security
941 Documents
Intrusion Detection
643 Documents
Intrusion Prevention
705 Documents
IPSec
155 Documents
Linux
86 Documents
Local Area Networking
224 Documents
Microsoft Exchange
129 Documents
Mobile Computing
467 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance Management
385 Documents
Network Provisioning
211 Documents
Network Security Appliance
382 Documents
Password Management
226 Documents
PDA
116 Documents
Phishing
188 Documents
PKI
112 Documents
Remote Access
280 Documents
Remote Network Management
236 Documents
Risk Management
294 Documents
Secure Instant Messaging
175 Documents
Security Management
1072 Documents
Security Policies
431 Documents
Servers
484 Documents
Single Sign On
138 Documents
Small Business Networks
269 Documents
SSL
211 Documents
System Management Software
153 Documents
TCP/IP Protocol
173 Documents
Total Cost of Ownership
248 Documents
Tunneling
141 Documents
Web Service Security
367 Documents
WiFi
95 Documents
Windows Server
117 Documents
Wireless Application Software
213 Documents
Wireless Security
250 Documents
Wireless Service Providers
121 Documents
WLAN
74 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.