Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 1 - 25 of 279Sort Results By: Published Date | Title | Company Name
By: Arbor Networks     Published Date: Apr 30, 2014

Whether you’re a hosting provider, cloud infrastructure provider or an enterprise with cloud-based services, you need to be aware of the impact DDoS attacks can have on the availability of your business or its cloud-based services. Join Arbor Networks, the industry leader in DDoS protection, by registering for this free presentation.

Tags : ddos, arbor, arbor networks, cloud computing, cloud, cloud security, hackers, hacker attacks
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
By: Lumension     Published Date: Feb 07, 2014

Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.

Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

Distributed denial-of-service attacks may be organized by type into a taxonomy that includes network attacks (layers 3 and 4), session attacks (layers 5 and 6), application attacks (layer 7), and business logic attacks. Each type may be matched with the best F5 technology for mitigating that attack. This paper explains how taken together, the F5 BIG-IP portfolio of products provides effective anti-attack technology for each layer of the taxonomy and can also defend against specific attack tools, network reconnaissance, and low-bandwidth asymmetric attacks.

Tags : distributed denial of service, ddos, mitigation, f5 technology, taxonomy, network attacks, session attacks, application attacks
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This white paper examines the DDoS threat spectrum including conventional network attacks, HTTP and SSL floods, and an emerging wave of low-bandwidth threats, plus the new threat vectors likely to target emerging service platforms.

Tags : distributed denial of service, ddos, ddos threat spectrum, network attacks, conventional network attacks, http floods, ssl floods, low bandwith threats
    
By: F5 Networks Inc     Published Date: Oct 31, 2013

This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.

Tags : denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
By: Comcast     Published Date: Apr 26, 2013

Learn how to select the most optimal business Ethernet service in this 9 step guide that will show you how to meet your many application needs while reducing costs.

Tags : ethernet, wan, wide area network, productivity, business continuity, network, customer satisfaction, bandwidth management
    
By: Code 42     Published Date: Mar 20, 2014

Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.

Tags : code42 software, endpoint backup, data migration, data loss, data management, data risk, encryption, network security
    
By: Rapid7     Published Date: Mar 19, 2014

This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.

Tags : rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
By: Rapid7     Published Date: Mar 19, 2014

In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.

Tags : rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
By: Black Lotus     Published Date: Mar 06, 2014

Download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company. As a provider of distributed denial of service (DDoS) mitigation services, Black Lotus is in a unique position to observe and collect real time data on the threats facing service providers, enterprises, and government agencies.

Tags : ddos, black lotus, black lotus communications, firewall, security, security intelligence, intrusion, network security
    
By: FireEye     Published Date: Feb 28, 2014

Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.

Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam
    
By: Global Knowledge     Published Date: Feb 14, 2014

EIGRP has been used successfully for many years by enterprises of all sizes, using mostly Cisco devices. Find out why EIGRP is a viable choice for an enterprise routing protocol.

Tags : global knowledge, eigrp, ip routing protocols, routing protocols, construction and maintenance, protocol database, configuration, verification
    
By: Kaspersky     Published Date: Feb 14, 2014

Inside you'll find survey analysis, discover trends, and learn more about what you need to know when it comes to security management.

Tags : kaspersky, security, security management, byod, network security, application security, security policies
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

Tags : threat management, cyberthreat, cybersecurity, kaspersky, it security, security management, network security, anti spyware
    
By: Kaspersky     Published Date: Feb 14, 2014

Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.

Tags : patch management, cybersecurity, firewalls, malware, hackers, virus, threats, network security
    
By: Kaspersky     Published Date: Feb 14, 2014

While the business benefits of virtualization are clear—increased performance and stability and decreased hardware costs, floor space, and management oversight—the virtualized world makes your organization vulnerable to a wide array of new cyber security threats. Are you willing to bet your organization’s IT infrastructure on your ability to combat these hazards?

Tags : virtualization, cloud computing, cloud security, data protection, network security, security management, vulnerability management
    
By: McAfee     Published Date: Jan 22, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : mcafee, gartner, endpoint protection, network security, application security, email security, hacker detection, intrusion prevention
    
By: SafeNet     Published Date: Jan 14, 2014

Today’s data resides in a virtualized world, but the risks are all too real, and, in many organizations, too frequently realized. This paper examines the fundamental security implications of cloud services and virtualization, and it details an approach organizations can take to safeguard sensitive assets in a way that is aligned with today’s dynamic environments.

Tags : virtualization, cloud services, security, encryption, safenet, network security, internet security
    
By: SafeNet     Published Date: Jan 14, 2014

SafeNet CN high speed network data encryption devices are purpose built hardware appliances that secure data transmitted across Layer 2 networks. The CN series platforms provide highly secure, full line rate transparent encryption for data moving across both dark Fibre and metro, or wide area Ethernet networks in point-point, hub & spoke, or any meshed environment.

Tags : wan optimization, wan, encryption, network data security, wan acceleration, safenet, wireless, network security
    
By: SafeNet     Published Date: Jan 14, 2014

Most service providers’ Virtual Private Network (VPN) security delivers little more than a promise to keep each customer’s data separated across a shared infrastructure. What are the risks of this virtual security model and how can it go wrong? This technical paper is prepared from an interview with Senetas CTO Julian Fay, in which these topics are discussed and practical considerations given for using encryption on VPNs to enhance organizations’ data security.

Tags : virtual private networks, virtual security, vpn, infrastructure, data, encryption, network, private network
    
By: CA Technologies     Published Date: Jan 08, 2014

Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.

Tags : ca technologies, identity, identity management, identity and access management, iam, cloud, user provisioning, security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Access Control
995 Documents
Active Directory
165 Documents
Anti Spam
530 Documents
Anti Spyware
585 Documents
Anti Virus
642 Documents
Application Security
1034 Documents
Authentication
372 Documents
Biometrics
110 Documents
Business Continuity
381 Documents
Cisco Certification
13 Documents
Cloud Computing
777 Documents
Clustering
100 Documents
Colocation and Web Hosting
225 Documents
Data Center Design and Management
548 Documents
DDoS
170 Documents
Disaster Recovery
503 Documents
Email Security
652 Documents
Encryption
489 Documents
Ethernet Networking
179 Documents
Firewalls
403 Documents
Hacker Detection
543 Documents
Infrastructure
828 Documents
Internet Security
1021 Documents
Intrusion Detection
715 Documents
Intrusion Prevention
754 Documents
IPSec
167 Documents
Linux
90 Documents
Local Area Networking
224 Documents
Microsoft Exchange
119 Documents
Mobile Computing
403 Documents
Network Architecture
412 Documents
Network Management
643 Documents
Network Performance Management
372 Documents
Network Provisioning
211 Documents
Network Security Appliance
413 Documents
Password Management
246 Documents
PDA
116 Documents
Phishing
191 Documents
PKI
126 Documents
Remote Access
263 Documents
Remote Network Management
233 Documents
Risk Management
287 Documents
Secure Instant Messaging
196 Documents
Security Management
1123 Documents
Security Policies
476 Documents
Servers
452 Documents
Single Sign On
151 Documents
Small Business Networks
260 Documents
SSL
208 Documents
System Management Software
154 Documents
TCP/IP Protocol
169 Documents
Total Cost of Ownership
262 Documents
Tunneling
141 Documents
Web Service Security
336 Documents
WiFi
94 Documents
Windows Server
113 Documents
Wireless Application Software
199 Documents
Wireless Security
227 Documents
Wireless Service Providers
123 Documents
WLAN
75 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.