Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 1 - 25 of 330Sort Results By: Published Date | Title | Company Name
By: CDW     Published Date: Feb 27, 2015

In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: Riverbed     Published Date: Feb 26, 2015

In order to be successful today, operations teams require complete application-level visibility across the entire environment.

Tags : customer relationship management, security, human resources, sales force automation, application integration, data protection, network performance, network management
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: CDW     Published Date: Feb 24, 2015

All organizations require software systems to conduct daily operations. These strategic enterprise assets are often acquired or created in isolation of each other as an organization grows, particularly for those that provide services rather than physical products. Over time, these systems become complex, overlapping and highly dependent on one another, so more effort must be expended to discover the full effects of any system change. The ability of an entity to update, replace or improve the overall capabilities of the enterprise can become severely impaired. Moreover, support and administrative costs for these critical assets inevitably grow to be a major burden. Add to all this the need to control licensing, follow the organization’s policies and ensure security for the internal network, and it becomes clear that some manner of oversight is required for the enterprise to be successful.

Tags : sam, software asset management, strategic enterprise assets, license utilization, cloud based computing, network security, software compliance, vulnerability management
    
By: CDW     Published Date: Feb 24, 2015

Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.

Tags : software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
By: Avaya     Published Date: Feb 06, 2015

Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!

Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, network security, remote access, remote network management, mobile computing
    
By: Avaya     Published Date: Jan 28, 2015

Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!

Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, infrastructure, network security, remote network management, mobile computing
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Users Beware: 10 Security Tips to Share with Your Users - ThreatTrack Security has compiled these 10 tips to help your users avoid common online threats. The following information is available to IT admins to share with users so they are more aware of the security traps they face every day.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: ThreatTrack Security     Published Date: Jan 22, 2015

Exploit Kits: Cybercrime's Growth Industry - Cybercriminals have turned their attention away from exploiting Windows operating systems to pursuing the popular third-party applications installed on nearly every PC around the world. That is why patch management has become a critical layer in your malware defense.

Tags : threattrack, security, threat, track, information, admins, best, practices
    
By: Avaya     Published Date: Jan 20, 2015

Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!

Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya, infrastructure, network security, remote access, remote network management
    
By: Entrust     Published Date: Jan 16, 2015

Google is phasing out SHA-1, a secure hash algorithm for SSL certificates that has proven susceptible to collision attacks. But upgrading is complex. Entrust navigates you through the rapid sun-setting of SHA-1 certificates for a seamless, secure experience for your end users.

Tags : entrust, sha-2, chrome, security, certificate, b2b, application, browser
    
By: Entrust     Published Date: Jan 16, 2015

Certain types of diseases seem to only occur within certain national boundaries. Malware is not one of them. A formidable threat to enterprise security since the 1980s, cybercrime is a truly global phenomenon, and no business is safe from its reach. A brief look at the history of malware attacks reveals a degree of variance within the virtual threat landscape that makes pinpointing and stopping such attacks extremely difficult. As the historic virus examples illustrate, the malware problem has been and will continue to be a constant threat. Since an offensive line against cybercrime is not possible, enterprises need to prepare the best defense they can.

Tags : entrust, malware, history, threat, concern, virus, sql, stuxnet
    
By: Entrust     Published Date: Jan 16, 2015

With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.

Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication
    
By: Comcast     Published Date: Jan 15, 2015

Technology evolves at breakneck speed, and it plays an increasingly important role in the success of all types of businesses, regardless of size.

Tags : comcast, technology, business, blueprint, plan, start-up, start, future
    
By: Kaspersky     Published Date: Dec 09, 2014

Most established organizations have large IT departments with staff exclusively devoted to IT security. Education is a key component of this defensive strategy in today’s cybercriminal ecosystem. If you don’t know it’s there, you can’t defend against it.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, email security, identity management, network security, anti spyware
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Comcast     Published Date: Apr 26, 2013

Learn how to select the most optimal business Ethernet service in this 9 step guide that will show you how to meet your many application needs while reducing costs.

Tags : ethernet, wan, wide area network, productivity, business continuity, network, customer satisfaction, bandwidth management
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.

Tags : juniper, juniper networks, security, network security, firewalls, intrusion prevention, security management, data protection
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End

Related IT Whitepaper Topics

Access Control
689 Documents
Active Directory
175 Documents
Anti Spam
572 Documents
Anti Spyware
608 Documents
Anti Virus
653 Documents
Application Security
819 Documents
Authentication
363 Documents
Biometrics
112 Documents
Business Continuity
386 Documents
Cisco Certification
13 Documents
Cloud Computing
1004 Documents
Clustering
119 Documents
Colocation and Web Hosting
249 Documents
Data Center Design and Management
631 Documents
DDoS
185 Documents
Disaster Recovery
504 Documents
Email Security
585 Documents
Encryption
457 Documents
Ethernet Networking
189 Documents
Firewalls
399 Documents
Hacker Detection
461 Documents
Infrastructure
894 Documents
Internet Security
916 Documents
Intrusion Detection
598 Documents
Intrusion Prevention
666 Documents
IPSec
156 Documents
Linux
88 Documents
Local Area Networking
232 Documents
Microsoft Exchange
131 Documents
Mobile Computing
561 Documents
Network Architecture
464 Documents
Network Management
683 Documents
Network Performance Management
421 Documents
Network Provisioning
220 Documents
Network Security Appliance
360 Documents
Password Management
214 Documents
PDA
122 Documents
Phishing
197 Documents
PKI
120 Documents
Remote Access
304 Documents
Remote Network Management
254 Documents
Risk Management
312 Documents
Secure Instant Messaging
177 Documents
Security Management
1032 Documents
Security Policies
417 Documents
Servers
506 Documents
Single Sign On
140 Documents
Small Business Networks
285 Documents
SSL
229 Documents
System Management Software
159 Documents
TCP/IP Protocol
180 Documents
Total Cost of Ownership
261 Documents
Tunneling
150 Documents
Web Service Security
375 Documents
WiFi
114 Documents
Windows Server
124 Documents
Wireless Application Software
234 Documents
Wireless Security
269 Documents
Wireless Service Providers
126 Documents
WLAN
80 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.