Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 26 - 50 of 308Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

See how this next generation firewall performed in real-life. ESG Lab puts the McAfee NGFW through the paces in this recent report.

Tags : esg, esg lab, firewall evaluation, firewall lab report, firewall test, next generation firewall, mcafee ngfw, security
    
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Citrix     Published Date: Jul 25, 2014

After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.

Tags : mobility management, citrix, mobile app, network security, remote access, mobile workers, smart phones, wireless infrastructure
    
By: Citrix     Published Date: Jul 25, 2014

According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise mobile is not something you can avoid. But you can do it safely. This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.

Tags : enterprise mobile, executive checklist, security, byod, network security, mobile workers, smart phones, it spending
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why itís critical for SMEs to protect all endpoints Ė not just mobile devices Ė in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Black Lotus     Published Date: Apr 21, 2014

Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.

Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
By: Code42     Published Date: Mar 20, 2014

Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.

Tags : code42 software, endpoint backup, data migration, data loss, data management, data risk, encryption, network security
    
By: Rapid7     Published Date: Mar 19, 2014

This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you canít control.

Tags : rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
By: Rapid7     Published Date: Mar 19, 2014

In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.

Tags : rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
By: Symantec     Published Date: Mar 14, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
    
By: FireEye     Published Date: Feb 28, 2014

Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.

Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam
    
By: Arbor Networks     Published Date: Feb 12, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors.

Tags : arbor, arbor networks, security management, firewalls, threats, hackers, internet security, network security
    
By: McAfee     Published Date: Jan 22, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : mcafee, gartner, endpoint protection, network security, application security, email security, hacker detection, intrusion prevention
    
By: Symantec     Published Date: Jan 15, 2014

This yearís ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantecís security experts. In this summary, we call out seven areas that deserve special attention.

Tags : symantec, cyberespionage, mobile security, mobile device security, threat report, cyberattacks, cyber attacks, data protection
    
By: SafeNet     Published Date: Jan 14, 2014

Todayís data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with todayís dynamic environments.

Tags : virtualization, cloud services, security, encryption, safenet, network security, internet security
    
By: SafeNet     Published Date: Jan 14, 2014

SafeNet CN high speed network data encryption devices are purpose built hardware appliances that secure data transmitted across Layer 2 networks. The CN series platforms provide highly secure, full line rate transparent encryption for data moving across both dark Fibre and metro, or wide area Ethernet networks in point-point, hub & spoke, or any meshed environment.

Tags : wan optimization, wan, encryption, network data security, wan acceleration, safenet, wireless, network security
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End

Related IT Whitepaper Topics

Access Control
675 Documents
Active Directory
169 Documents
Anti Spam
554 Documents
Anti Spyware
583 Documents
Anti Virus
636 Documents
Application Security
785 Documents
Authentication
349 Documents
Biometrics
111 Documents
Business Continuity
381 Documents
Cisco Certification
13 Documents
Cloud Computing
956 Documents
Clustering
121 Documents
Colocation and Web Hosting
242 Documents
Data Center Design and Management
604 Documents
DDoS
178 Documents
Disaster Recovery
499 Documents
Email Security
587 Documents
Encryption
449 Documents
Ethernet Networking
185 Documents
Firewalls
381 Documents
Hacker Detection
453 Documents
Infrastructure
860 Documents
Internet Security
885 Documents
Intrusion Detection
582 Documents
Intrusion Prevention
644 Documents
IPSec
155 Documents
Linux
87 Documents
Local Area Networking
229 Documents
Microsoft Exchange
131 Documents
Mobile Computing
527 Documents
Network Architecture
451 Documents
Network Management
664 Documents
Network Performance Management
399 Documents
Network Provisioning
218 Documents
Network Security Appliance
350 Documents
Password Management
208 Documents
PDA
117 Documents
Phishing
196 Documents
PKI
119 Documents
Remote Access
289 Documents
Remote Network Management
242 Documents
Risk Management
299 Documents
Secure Instant Messaging
176 Documents
Security Management
997 Documents
Security Policies
403 Documents
Servers
498 Documents
Single Sign On
138 Documents
Small Business Networks
277 Documents
SSL
226 Documents
System Management Software
158 Documents
TCP/IP Protocol
178 Documents
Total Cost of Ownership
257 Documents
Tunneling
147 Documents
Web Service Security
371 Documents
WiFi
108 Documents
Windows Server
118 Documents
Wireless Application Software
227 Documents
Wireless Security
254 Documents
Wireless Service Providers
126 Documents
WLAN
76 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.