Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 76 - 100 of 331Sort Results By: Published Date | Title | Company Name
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: CA Technologies     Published Date: Jan 08, 2014

Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.

Tags : ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
By: CA Technologies     Published Date: Jan 08, 2014

Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.

Tags : ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
By: Citrix     Published Date: Dec 09, 2013

Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.

Tags : citrix, byod, apple ios, windows, android, smarphones, tablets, secure delivery
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Centrify     Published Date: Nov 10, 2013

Leveraging the cloud to bring cost effectiveness and efficiency to an organisation must always be coupled with advanced security measures. Learn how Centrify, through its wide range of products, is able to provide firms both basic and advanced identity access management solutions - making fully integrated security possible.

Tags : centrify, iam, identity management, access management, identity and access management, security, cloud solutions, cloud security
    
By: Qualys     Published Date: Nov 05, 2013

Regardless of platform, the Web has become a hub of information and productivity. The browser has evolved to become one of the most-used applications, which has drawn the attention of cyber criminals – making it a potential Achilles heel for security.

Tags : qualys, qualys browsercheck, security, web security, application security, web browser, cyber criminals, vulnerability
    
By: Qualys     Published Date: Nov 05, 2013

Patching is a key strategy for managing vulnerabilities and ensuring enterprise-wide security. Unfortunately, there are often so many flaws in software that patching becomes an overwhelming process. This white paper describes an approach to patch management that allows you to prioritize vulnerabilities that pose the greatest risk and accelerate the speed at which patches are applied. Also inside, find ten steps to improve patching – read on to learn more.

Tags : qualys, qualysguard, security, patch acceleration, vulnerability, vulnerability management, robustness, patching system
    
By: Qualys     Published Date: Nov 05, 2013

Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.

Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
By: Qualys     Published Date: Nov 05, 2013

Organizations have traditionally viewed vulnerability scanners as a tactical product, largely commoditized and only providing value around audit time. But with limited resources and a real need to reduce risk, organizations need the ability to pull in threat-related data, combine it with an understanding of what is vulnerable, and figure out what is at risk. This report from Securosis outlines how yesterday's vulnerability scanners are evolving to meet this need, emerging as a much more strategic component of an organization's control set than in the past. Learn how vulnerability scanners are evolving to provide real value beyond vulnerability reports for auditors - emerging as a strategic component helping organizations effectively lower risks.

Tags : qualys, securosis, vulnerability, vulnerability management, scanning, infrastructure, core technologies, value-add technologies
    
By: Qualys     Published Date: Nov 05, 2013

A zero-day threat is a vulnerability that becomes known to the vendor on the same day it becomes known to the public, meaning IT assets targeted by a zero-day threat won't have a patch available when it's needed. However, zero-day attacks operate in a realm of the probable - they work only because there are exploitable vulnerabilities within IT systems. Many of these can, and should be prevented. This guide describes why organizations are vulnerable to zero-day attacks, and what you can do to add a zero-day offense to your existing vulnerability management processes to protect your organization's assets and data.

Tags : qualys, qualys zero-day risk analyzer, zero-day, zero-day offense, vulnerability, vulnerability management, zero-day threat, patch availablity
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.

Tags : distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.

Tags : denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn how an East Coast University and a prominent healthcare provider were able to maintain their IT availability during Hurricane Sandy with a comprehensive Disaster Recovery Program.

Tags : sungard, sungard availability service, enterprise resilency, application recovery, disaster recovery, productivity, it management, recovery
    
By: Citrix     Published Date: Oct 15, 2013

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
By: McAfee     Published Date: Oct 14, 2013

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, network security, email security
    
By: McAfee     Published Date: Oct 10, 2013

Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Tags : mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, network performance
    
By: Rapid7     Published Date: Oct 09, 2013

Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.

Tags : gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection, network security
    
By: Dextra Technologies     Published Date: Aug 30, 2013

It’s no longer sufficient talk about the importance of mobility for IT-enabled operations. Instead, think about the concept of pervasive mobility, where the current generation of traditional devices like notebooks are augmented, and perhaps eventually replaced, by a new armada of consumer-class devices at the edge of the network. In fact, the bulk of information now being created and stored on corporate networks comes from notebooks, tablets and smartphones.

Tags : best practices, pervasive mobility, information technology, mobile, network, gadgets, consumer class devices, smartphones
    
By: BlueCat     Published Date: Aug 20, 2013

To enable always-on application access and business connectivity, you need a rock-solid network foundation. The increasingly complex, dynamic and fluid relationship between networks and devices requires a new approach to IP Address Management (IPAM) – one that unifies mobile security, address management, automation and self-service to provide actionable network intelligence and a broad span of control. This paper discusses the critical role of IPAM in providing a smarter way to connect mobile devices, applications, virtual environments and clouds.

Tags : device management, ipam, ip address management, ip management, dns management, dhcp management, network security, network management
    
By: F5 Networks Inc     Published Date: Aug 15, 2013

Between the proliferation of mobile devices and the ever increasing amount of content on the web, DNS usage has seen a huge increase in recent years. Meanwhile, DNS continues to be a tempting target for attackers, and when they succeed in disrupting DNS, all external data center services are affected. For organizations confronting these growth and security challenges, F5’s new full proxy architecture for DNS provides a complete solution for global, local, and cloud load balancing.

Tags : domain name system, dns, infrastructure, global, local, cloud load balancing, dns systems, dns infrastructure
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End

Related IT Whitepaper Topics

Access Control
685 Documents
Active Directory
175 Documents
Anti Spam
574 Documents
Anti Spyware
608 Documents
Anti Virus
658 Documents
Application Security
821 Documents
Authentication
363 Documents
Biometrics
112 Documents
Business Continuity
385 Documents
Cisco Certification
13 Documents
Cloud Computing
1016 Documents
Clustering
119 Documents
Colocation and Web Hosting
250 Documents
Data Center Design and Management
631 Documents
DDoS
191 Documents
Disaster Recovery
513 Documents
Email Security
577 Documents
Encryption
458 Documents
Ethernet Networking
190 Documents
Firewalls
398 Documents
Hacker Detection
465 Documents
Infrastructure
907 Documents
Internet Security
919 Documents
Intrusion Detection
597 Documents
Intrusion Prevention
662 Documents
IPSec
156 Documents
Linux
86 Documents
Local Area Networking
233 Documents
Microsoft Exchange
130 Documents
Mobile Computing
566 Documents
Network Architecture
465 Documents
Network Management
689 Documents
Network Performance Management
423 Documents
Network Provisioning
220 Documents
Network Security Appliance
361 Documents
Password Management
213 Documents
PDA
122 Documents
Phishing
198 Documents
PKI
120 Documents
Remote Access
302 Documents
Remote Network Management
255 Documents
Risk Management
315 Documents
Secure Instant Messaging
177 Documents
Security Management
1036 Documents
Security Policies
415 Documents
Servers
500 Documents
Single Sign On
140 Documents
Small Business Networks
284 Documents
SSL
229 Documents
System Management Software
159 Documents
TCP/IP Protocol
178 Documents
Total Cost of Ownership
263 Documents
Tunneling
150 Documents
Web Service Security
378 Documents
WiFi
114 Documents
Windows Server
123 Documents
Wireless Application Software
235 Documents
Wireless Security
268 Documents
Wireless Service Providers
126 Documents
WLAN
80 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.