Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 151 - 175 of 286Sort Results By: Published Date | Title | Company Name
By: Clearswift     Published Date: Jun 09, 2008

In this white paper Clearswift address the question "Is it possible to build a leak free enterprise?" In addition to a Gartner research note on "Understand Data Leakage" we answer the question by describing 15 of the most common mistakes of web and email security and the associated risks and solutions.

Tags : data protection, clearswift, data management, network security
    
By: Clearswift     Published Date: Jun 09, 2008

Websites that did not exist five years ago are now at the top of the most visited and used sites on the Web.  Yesterday's teenagers and college students, who have grown up using MySpace, YouTube and other Web 2.0 sites are bringing their social habits into the workplace, and creating a number of challenges for employers.

Tags : enterprise security, web 2.0, gartner, clearswift, clearswift, social media, social networking, network security
    
By: MX Logic     Published Date: May 21, 2008

Rootkits, Trojans, ransomware, Denial-of-Service and much more – this newly released white paper from MX Logic covers the everchanging security threat landscape. Learn what malicious intrusions are out there, how to identify them and how to keep your network safe.

Tags : botnets, dha, dos, denial of service, queen bot, malware, drive by, storm worm
    
By: MX Logic     Published Date: May 21, 2008

In this recent report, the Aberdeen Group’s research revealed that 100% of Best-in-Class companies consume some managed security services as part of their security strategy. The most widely deployed and easiest to implement managed security service is email security.

Tags : managed security services, managed services, email security, security solutions, web security, security incidents, data loss, malware infections
    
By: Burton Group     Published Date: Apr 08, 2008

In this Methodologies and Best Practices document, Burton Group Research Director Daniel Blum recounts customer perspectives on the anti-malware battlefield playing out at the enterprise level. The document explores lessons learned, and what keeps customers awake at night even after good defensive strategies are in place. The Reference RFI alone is valuable for those switching anti-malware products, or seeking new ones.

Tags : burton group, best practices, malware, security, email security, network security, content filtering, intrusion detection
    
By: GFI     Published Date: Mar 25, 2008

This white paper explains what makes spam such an unbearable problem and how spamming tactics are evolving daily to beat anti-spam software. In the space of two months, spammers have switched from image spam to using PDF, Excel and ZIP file attachments. By using these attachments to send images instead of embedding them in the body of the email message, spammers have taken the cat-and-mouse game with anti-spam software developers to a new level.

Tags : attachment spam, filter attachment spam, image spam, pdf spam, excel spam, xls spam, stock spam, gfi
    
By: Panda Security     Published Date: Feb 27, 2008

E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.

Tags : malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security
    
By: Panda Security     Published Date: Feb 27, 2008

With thousands of new malware threats being created and unleashed into the Internet daily, the End Point security model is failing.  Without additional layers of security, infiltration may be virtually impossible to stop.  This important white paper explores alternatives that eliminate dangerous traffic prior to reaching the network or server.

Tags : email security, e-mail security, security appliance, desktop, endpoint security, end point security, anti-spam, spam
    
By: IBM     Published Date: Feb 08, 2008

Technology has helped financial institutions work harder and faster than ever before. The downside: Sensitive data is more vulnerable than ever before. Financial Insights offers ideas and solutions to improve Information Security (IS). Click to learn more on protecting your most important assets, your data.

Tags : bank, banks, financial, financial institutions, fisma, compliance, data security, information management
    
By: Panda Security     Published Date: Feb 06, 2008

Today’s targeted malware attacks are infecting unsuspecting businesses at astonishing rates, rendering traditional antivirus solutions ineffective. Reported and known viruses are becoming less important compared to the increase in unknown threats and attacks.

Tags : security, threats, ips, intrusion prevention, internet security, hackers, hacker, virus
    
By: ESET     Published Date: Feb 01, 2008

With the ever evolving threat landscape, what will 2008 hold for IT Managers?  This podcast provides a high level overview of a few trends to watch for this year.

Tags : 2008 predications, it security predictions, it security, mobile devices, laptops, endpoint, operating systems, antivirus
    
By: Solidcore     Published Date: Jan 07, 2008

New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. Fortrex, in conjunction with Solidcore and Emagined Security have compiled a PCI compliance report that reveals the cost of a breach can easily be 20 times the cost of PCI compliance, more than justifying the up-front investment.

Tags : pci, pci dss, pci compliance, compliance, payment card, credit card, data protection, data security
    
By: netForensics     Published Date: Jan 04, 2008

To manage threats to the enterprise and successfully meet compliance challenges, organizations need a comprehensive security strategy that can successfully do battle with inside as well as outside threats. Today, companies are increasingly leveraging security information management (SIM) solutions to build a clean, concise, and manageable process for dealing with the tremendous volumes of raw security information from disparate devices, applications, and databases.

Tags : monitoring, hackers, internal threats, bad employee, identity theft, data protection, hacker, security management
    
By: Guardian Digital     Published Date: Oct 02, 2007

Open source is just a method to reaching a goal, not a goal in itself. In this overview, "The Top 5 Open Source Security Myths," you will be introduced to some of the largest misconceptions regarding open source security.

Tags : open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian
    
By: Guardian Digital     Published Date: Oct 02, 2007

Guardian Digital's EnGarde Secure Linux is the world's premier secure operating platform engineered from Open Source Technologies.  Written in an easy to read, plain-language format, you will get introduced to the full range of benefits that makes EnGarde "Secure By Design."

Tags : open source, open source security, network security, adaptability, security management, email security, guardian digital, digital guardian
    
By: BlueCat     Published Date: Sep 14, 2007

This paper introduces and describes the principal concepts and techniques involved with DNS best practices.

Tags : dns, dns server, dns servers, server, servers, ip network, ip networks, ip address
    
By: Axeda Corporation     Published Date: Sep 06, 2007

Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.

Tags : remote, remote access, remote network, network management, network security, data center, datacenter, data center management
    
By: Motorola     Published Date: Aug 09, 2007

Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.

Tags : mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost
    
By: AirDefense     Published Date: Apr 24, 2007

This paper presents the security risks inherit in wireless networks and explores the technical, functional and return on investment requirements needed for a monitoring solution for companies looking to protect and fortify their wireless networks from rogue wireless devices.

Tags : wlan, wireless security, wireless freeloaders, wireless rogue, rogue, rogues, wireless infrastructure, monitoring
    
By: thawte     Published Date: Nov 06, 2006

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, security policies, network security, servers, windows server, microsoft web server, security certificate, networking best practices
    
By: FireEye     Published Date: Feb 28, 2014

This whitepaper further educates you on the new security challenges for state and local governments.

Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
By: FireEye     Published Date: Feb 28, 2014

How are data centers becoming unwitting accomplices in advanced cyber attacks?

Tags : fireeye, persistent threats, advanced attacks, data centers, cyber-attacks, speed of detection, accuracy of detection, data warehouse
    
By: FireEye     Published Date: Feb 28, 2014

Organizations need much more than fundamental security tools. Do you know why? Learn more in this whitepaper.

Tags : fireeye, gartner research, cyber attacks, security posture, system exploitation, advanced attacks, malware download, control established
    
By: Global Knowledge     Published Date: Jul 09, 2013

As time goes on, we'll be seeing more and more of 802.1X in the environments we support. We have to for due diligence. Allowing trusted and non-trusted hosts to connect to our networks without proper controls is really just turning a blind eye to security. You may have heard concerns or nightmare stories about 802.1X, but with the tools we have today and the method of implementation, this can be seamless in an environment and far exceeds any compliance requirements you may have.

Tags : education and training, it career advancement, security, 802.11, authentication, access control, application security, network security
    
By: Sponsored by HP and Intel      Published Date: Feb 21, 2013

HP CloudSystem Matrix enables organizations to realign traditional technology silos into virtual pools sharable by different applications and flexible enough to change as business needs evolve.

Tags : integrated, infrastructure, cloud it, public cloud, hybrid cloud, governance, network architecture, network management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Access Control
856 Documents
Active Directory
165 Documents
Anti Spam
554 Documents
Anti Spyware
602 Documents
Anti Virus
667 Documents
Application Security
917 Documents
Authentication
378 Documents
Biometrics
116 Documents
Business Continuity
394 Documents
Cisco Certification
13 Documents
Cloud Computing
825 Documents
Clustering
105 Documents
Colocation and Web Hosting
225 Documents
Data Center Design and Management
548 Documents
DDoS
181 Documents
Disaster Recovery
510 Documents
Email Security
643 Documents
Encryption
487 Documents
Ethernet Networking
180 Documents
Firewalls
406 Documents
Hacker Detection
533 Documents
Infrastructure
827 Documents
Internet Security
981 Documents
Intrusion Detection
664 Documents
Intrusion Prevention
726 Documents
IPSec
171 Documents
Linux
90 Documents
Local Area Networking
224 Documents
Microsoft Exchange
124 Documents
Mobile Computing
425 Documents
Network Architecture
420 Documents
Network Management
645 Documents
Network Performance Management
379 Documents
Network Provisioning
211 Documents
Network Security Appliance
409 Documents
Password Management
244 Documents
PDA
116 Documents
Phishing
201 Documents
PKI
129 Documents
Remote Access
278 Documents
Remote Network Management
237 Documents
Risk Management
292 Documents
Secure Instant Messaging
195 Documents
Security Management
1110 Documents
Security Policies
468 Documents
Servers
473 Documents
Single Sign On
158 Documents
Small Business Networks
271 Documents
SSL
222 Documents
System Management Software
153 Documents
TCP/IP Protocol
175 Documents
Total Cost of Ownership
254 Documents
Tunneling
141 Documents
Web Service Security
367 Documents
WiFi
93 Documents
Windows Server
116 Documents
Wireless Application Software
204 Documents
Wireless Security
237 Documents
Wireless Service Providers
122 Documents
WLAN
74 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.