Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 76 - 100 of 321Sort Results By: Published Date | Title | Company Name
By: Qualys     Published Date: Nov 05, 2013

Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.

Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
By: Qualys     Published Date: Nov 05, 2013

Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.

Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
By: Qualys     Published Date: Nov 05, 2013

A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.

Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.

Tags : distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.

Tags : denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn how an East Coast University and a prominent healthcare provider were able to maintain their IT availability during Hurricane Sandy with a comprehensive Disaster Recovery Program.

Tags : sungard, sungard availability service, enterprise resilency, application recovery, disaster recovery, productivity, it management, recovery
    
By: Citrix     Published Date: Oct 15, 2013

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
By: McAfee     Published Date: Oct 14, 2013

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, network security, email security
    
By: McAfee     Published Date: Oct 10, 2013

Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Tags : mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, network performance
    
By: Rapid7     Published Date: Oct 09, 2013

Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.

Tags : gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection, network security
    
By: Dextra Technologies     Published Date: Aug 30, 2013

It’s no longer sufficient talk about the importance of mobility for IT-enabled operations. Instead, think about the concept of pervasive mobility, where the current generation of traditional devices like notebooks are augmented, and perhaps eventually replaced, by a new armada of consumer-class devices at the edge of the network. In fact, the bulk of information now being created and stored on corporate networks comes from notebooks, tablets and smartphones.

Tags : best practices, pervasive mobility, information technology, mobile, network, gadgets, consumer class devices, smartphones
    
By: BlueCat     Published Date: Aug 20, 2013

To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.

Tags : device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management
    
By: F5 Networks Inc     Published Date: Aug 15, 2013

Between the proliferation of mobile devices and the ever increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile, DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. For organizations confronting these growth and security challenges, F5’s new full proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing.

Tags : domain name system, dns, infrastructure, global, local, cloud load balancing, dns systems, dns infrastructure
    
By: McAfee     Published Date: Jul 10, 2013

Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.

Tags : mcafee, blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod
    
By: BeyondTrust     Published Date: Jun 10, 2013

Retina CS is a privilege and vulnerability management solution that reports on vulnerabilities and threats, least privilege implementation, Unix/Linux server security, and compliance. It does this by capturing and reporting data from your servers, desktops, cloud, mobile and virtualized environments

Tags : vulnerability management, privilege management, compliance, server security, linux, unix, cloud, virtualization
    
By: BeyondTrust     Published Date: Jun 10, 2013

PowerBroker Identity Services is a privilege identity tool that integrates virtual and physical deployments of Linux, Mac and UNIX with Active Directory to authenticate users, control access, apply group policies, and provide single sign-on.

Tags : identity, active directory, authentication, user privilages, unix, mac os, compliance, hipaa
    
By: HP - Enterprise     Published Date: Jun 05, 2013

As the networks become ever more essential to business processes, they are also increasing rapidly in size and complexity. Many factors can affect network availability and performance—increasing traffic, configuration problems, failed network elements, changes, and more. Since not all of these problems are hard failures, managing the network to detect and correct business-impacting problems requires new tools, strategies, and initiatives. To deliver the availability and performance business demands, network management teams need to optimize fault management and ensure availability, unify fault and performance management, automate change and configuration management to ensure compliance, and automate IT processes. This integrated approach is called Automated Network Management (ANM).

Tags : network management, network, infrastructure, network architecture, network performance, network performance management, network security
    
By: Sophos     Published Date: May 09, 2013

This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.

Tags : network protection, sophos, buyers guide, security, application security, security software, firewall, vpn
    
By: Comcast     Published Date: Apr 26, 2013

Learn how to select the most optimal business Ethernet service in this 9 step guide that will show you how to meet your many application needs while reducing costs.

Tags : ethernet, wan, wide area network, productivity, business continuity, network, customer satisfaction, bandwidth management
    
By: Wolfe     Published Date: Apr 18, 2013

Cloud services create a compelling case to move application processing and storage out of the data center and onto the network.

Tags : ethernet, cloud, application processing, storage, data center, network, voip, unified communications
    
By: HP and Intel®     Published Date: Feb 21, 2013

This strategy lets you leverage your existing virtualization investments in order to quickly and cost-effectively reap the full benefits of the cloud.

Tags : cloud, cloud computing, storage, networks, high availability, private cloud, public cloud, hybrid cloud
    
By: McAfee     Published Date: Feb 12, 2013

AV-TEST preforms a comparative review of McAfee, Microsoft, and Symantec endpoint protection to pro-actively protect against zero-day attacks.

Tags : mcafee, av-test, deep defender, rootkits, detection, network security, email security, intrusion detection
    
By: Cisco     Published Date: Feb 05, 2013

Read this whitepaper to better understand a migration to the cloud, how to get started, and what the next steps are for your organization.

Tags : private cloud, roi, network, server, virtualization, infrastructure, network architecture, network management
    
By: Lumension     Published Date: Jan 18, 2013

Learn the recommended steps to cure your patch management headache as we dive into a technical discussion of what the critical items to address.

Tags : patch, best practices, networking, risk mitigation, network security, security, monitoring, network management
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End

Related IT Whitepaper Topics

Access Control
689 Documents
Active Directory
175 Documents
Anti Spam
557 Documents
Anti Spyware
590 Documents
Anti Virus
639 Documents
Application Security
798 Documents
Authentication
356 Documents
Biometrics
112 Documents
Business Continuity
384 Documents
Cisco Certification
13 Documents
Cloud Computing
980 Documents
Clustering
123 Documents
Colocation and Web Hosting
248 Documents
Data Center Design and Management
623 Documents
DDoS
184 Documents
Disaster Recovery
504 Documents
Email Security
589 Documents
Encryption
453 Documents
Ethernet Networking
189 Documents
Firewalls
393 Documents
Hacker Detection
463 Documents
Infrastructure
876 Documents
Internet Security
896 Documents
Intrusion Detection
593 Documents
Intrusion Prevention
654 Documents
IPSec
156 Documents
Linux
88 Documents
Local Area Networking
232 Documents
Microsoft Exchange
131 Documents
Mobile Computing
542 Documents
Network Architecture
458 Documents
Network Management
674 Documents
Network Performance Management
406 Documents
Network Provisioning
220 Documents
Network Security Appliance
358 Documents
Password Management
210 Documents
PDA
117 Documents
Phishing
196 Documents
PKI
120 Documents
Remote Access
299 Documents
Remote Network Management
253 Documents
Risk Management
300 Documents
Secure Instant Messaging
177 Documents
Security Management
1009 Documents
Security Policies
408 Documents
Servers
507 Documents
Single Sign On
140 Documents
Small Business Networks
286 Documents
SSL
227 Documents
System Management Software
159 Documents
TCP/IP Protocol
180 Documents
Total Cost of Ownership
259 Documents
Tunneling
150 Documents
Web Service Security
374 Documents
WiFi
108 Documents
Windows Server
124 Documents
Wireless Application Software
229 Documents
Wireless Security
266 Documents
Wireless Service Providers
126 Documents
WLAN
78 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.