Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 26 - 50 of 291Sort Results By: Published Date | Title | Company Name
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam
    
By: Arbor Networks     Published Date: Feb 12, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors.

Tags : arbor, arbor networks, security management, firewalls, threats, hackers, internet security, network security
    
By: Lumension     Published Date: Feb 07, 2014

Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.

Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
By: McAfee     Published Date: Jan 22, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : mcafee, gartner, endpoint protection, network security, application security, email security, hacker detection, intrusion prevention
    
By: Symantec     Published Date: Jan 15, 2014

This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts. In this summary, we call out seven areas that deserve special attention.

Tags : symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
By: SafeNet     Published Date: Jan 14, 2014

Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.

Tags : virtualization, cloud services, security, encryption, safenet, network security, internet security
    
By: SafeNet     Published Date: Jan 14, 2014

SafeNet CN high speed network data encryption devices are purpose built hardware appliances that secure data transmitted across Layer 2 networks. The CN series platforms provide highly secure, full line rate transparent encryption for data moving across both dark Fibre and metro, or wide area Ethernet networks in point-point, hub & spoke, or any meshed environment.

Tags : wan optimization, wan, encryption, network data security, wan acceleration, safenet, wireless, network security
    
By: SafeNet     Published Date: Jan 14, 2014

Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.

Tags : virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: Centrify     Published Date: Nov 10, 2013

Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.

Tags : centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security
    
By: Qualys     Published Date: Nov 05, 2013

Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.

Tags : qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability
    
By: Qualys     Published Date: Nov 05, 2013

Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.

Tags : qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system
    
By: Qualys     Published Date: Nov 05, 2013

Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.

Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
By: Qualys     Published Date: Nov 05, 2013

Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.

Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
By: Qualys     Published Date: Nov 05, 2013

A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.

Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Access Control
857 Documents
Active Directory
165 Documents
Anti Spam
554 Documents
Anti Spyware
602 Documents
Anti Virus
667 Documents
Application Security
918 Documents
Authentication
378 Documents
Biometrics
116 Documents
Business Continuity
394 Documents
Cisco Certification
13 Documents
Cloud Computing
826 Documents
Clustering
105 Documents
Colocation and Web Hosting
225 Documents
Data Center Design and Management
548 Documents
DDoS
181 Documents
Disaster Recovery
510 Documents
Email Security
644 Documents
Encryption
487 Documents
Ethernet Networking
180 Documents
Firewalls
406 Documents
Hacker Detection
534 Documents
Infrastructure
826 Documents
Internet Security
981 Documents
Intrusion Detection
664 Documents
Intrusion Prevention
726 Documents
IPSec
171 Documents
Linux
90 Documents
Local Area Networking
224 Documents
Microsoft Exchange
125 Documents
Mobile Computing
428 Documents
Network Architecture
420 Documents
Network Management
645 Documents
Network Performance Management
379 Documents
Network Provisioning
211 Documents
Network Security Appliance
409 Documents
Password Management
244 Documents
PDA
116 Documents
Phishing
201 Documents
PKI
129 Documents
Remote Access
280 Documents
Remote Network Management
237 Documents
Risk Management
292 Documents
Secure Instant Messaging
195 Documents
Security Management
1111 Documents
Security Policies
468 Documents
Servers
472 Documents
Single Sign On
158 Documents
Small Business Networks
271 Documents
SSL
222 Documents
System Management Software
153 Documents
TCP/IP Protocol
175 Documents
Total Cost of Ownership
253 Documents
Tunneling
141 Documents
Web Service Security
367 Documents
WiFi
93 Documents
Windows Server
117 Documents
Wireless Application Software
205 Documents
Wireless Security
241 Documents
Wireless Service Providers
122 Documents
WLAN
74 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.