Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 26 - 50 of 364Sort Results By: Published Date | Title | Company Name
By: Forrester Research     Published Date: Apr 27, 2015

Download the report to learn how to prepare an Incident Response Plan that ensures your business recovers quickly and effectively.

Tags : security, vulnerability management, analytics, threat prevention, cyber attacks, network architecture, network management, network performance
    
By: Citrix Systems     Published Date: Apr 15, 2015

App and desktop virtualization is much more than a technology solution. It is transforming the way organizations of all sizes are enabling their workforces while simplifying the desktop management process for IT administrators. With app and desktop virtualization, IT organizations can provide every user with a workspace environment completely unrestricted by physical location. This paper addresses many common business challenges facing IT organizations, such as enabling mobile workstyles without compromising security, streamlining desktop management efforts as the number of employees in remote offices and offshore locations increases and making the user experience personal through self-service access to applications and desktops.

Tags : citrix, desktop virtualization, efficiency, virtualization, mobile computing, network security, vpn, application integration
    
By: MaaS360 by Fiberlink     Published Date: Apr 15, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : mobile device security, byod, application security, data security, network security, access control, ssl, secure instant messaging
    
By: Cisco     Published Date: Apr 10, 2015

This document is a Cisco Validated Design (CVD) for Cisco Connected Mobile Experience (CMX) Solutions. It presents system-level requirements, recommendations, guidelines, and best practices for detecting, connecting, and engaging mobile users within your venue and leveraging your Wi-Fi network to fit your business needs. As Cisco continues to develop and enhance the technologies required to implement a CMX solution, this CVD will evolve and be updated to provide the latest guidelines, recommendations, and best practices for designing and deploying a CMX solution.

Tags : cisco, design, network architecture, mobile devices, best practices, wifi, wlan, wan
    
By: The Institute for Health Technology Transformation     Published Date: Apr 02, 2015

This exclusive report presents insight from industry analysts, data security specialists, and healthcare IT leaders to form some interesting perspectives on the trends, shortcomings and implications with regard to data breaches, regulatory compliance and security strategies for healthcare organizations.

Tags : security, data breach, heathcare security, compliance, regulatory compliance, network security, hacker detection, intrusion prevention
    
By: Arbor Networks     Published Date: Mar 23, 2015

After a discussion of the costs of DDoS attacks and current mitigation solutions, this paper examines Arbor Cloud, a DDoS service from Arbor Networks. This Technology Spotlight also provides advice for organizations evaluating DDoS mitigation solutions.

Tags : arbor networks, arbor, ddos, denial of service, denial of service attacks, network security, network overload, internet security
    
By: Arbor Networks     Published Date: Mar 13, 2015

As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.

Tags : arbor, arbor networks, hackers, cyberattacks, internet security, intrusion prevention, network security, anti virus
    
By: Arbor Networks     Published Date: Mar 13, 2015

Having the right tools and establishing key processes in advance can help prevent or mitigate the impact of a DDoS attack. Learn more by downloading this complimentary toolkit with research and best practices from Gartner and Arbor Networks.

Tags : arbor, arbor networks, ddos, denial of service, ddos attack, cloud ddos protection, network security, web service security
    
By: Kaseya     Published Date: Mar 12, 2015

To get the most out of their computer automation initiatives, financial institutions must take a step back, assess their current IT environments, adjust as needed and make important decisions regarding the future of their IT infrastructures.

Tags : financial institutions, it automation, it environments, it infrastructure, maintenance, network compliance, network security, software management
    
By: Riverbed     Published Date: Feb 26, 2015

In order to be successful today, operations teams require complete application-level visibility across the entire environment.

Tags : customer relationship management, security, human resources, sales force automation, application integration, data protection, network performance, network management
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: CDW     Published Date: Feb 24, 2015

All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.

Tags : sam, software asset management, strategic enterprise assets, license utilization, cloud based computing, network security, software compliance, vulnerability management
    
By: CDW     Published Date: Feb 24, 2015

Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.

Tags : software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.

Tags : juniper, juniper networks, security, network security, firewalls, intrusion prevention, security management, data protection
    
By: Juniper Networks     Published Date: Feb 18, 2015

Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.

Tags : firewall, network, business assets, security, management, network security, firewalls, security management
    
By: Avaya     Published Date: Feb 06, 2015

Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!

Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, network security, remote access, remote network management, mobile computing
    
By: Avaya     Published Date: Jan 28, 2015

Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!

Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, infrastructure, network security, remote network management, mobile computing
    
By: Avaya     Published Date: Jan 23, 2015

Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!

Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, network security, remote access, remote network management, mobile computing
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Access Control
696 Documents
Active Directory
175 Documents
Anti Spam
584 Documents
Anti Spyware
627 Documents
Anti Virus
671 Documents
Application Security
884 Documents
Authentication
377 Documents
Biometrics
116 Documents
Business Continuity
411 Documents
Cisco Certification
13 Documents
Cloud Computing
1188 Documents
Clustering
118 Documents
Colocation and Web Hosting
258 Documents
Data Center Design and Management
734 Documents
DDoS
191 Documents
Disaster Recovery
564 Documents
Email Security
589 Documents
Encryption
466 Documents
Ethernet Networking
193 Documents
Firewalls
423 Documents
Hacker Detection
510 Documents
Infrastructure
1023 Documents
Internet Security
972 Documents
Intrusion Detection
635 Documents
Intrusion Prevention
703 Documents
IPSec
155 Documents
Linux
86 Documents
Local Area Networking
232 Documents
Microsoft Exchange
134 Documents
Mobile Computing
731 Documents
Network Architecture
569 Documents
Network Management
802 Documents
Network Performance Management
488 Documents
Network Provisioning
226 Documents
Network Security Appliance
370 Documents
Password Management
214 Documents
PDA
122 Documents
Phishing
203 Documents
PKI
124 Documents
Remote Access
309 Documents
Remote Network Management
262 Documents
Risk Management
333 Documents
Secure Instant Messaging
178 Documents
Security Management
1122 Documents
Security Policies
445 Documents
Servers
535 Documents
Single Sign On
141 Documents
Small Business Networks
295 Documents
SSL
237 Documents
System Management Software
164 Documents
TCP/IP Protocol
178 Documents
Total Cost of Ownership
277 Documents
Tunneling
151 Documents
Web Service Security
390 Documents
WiFi
162 Documents
Windows Server
125 Documents
Wireless Application Software
267 Documents
Wireless Security
293 Documents
Wireless Service Providers
139 Documents
WLAN
128 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.