Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 1 - 25 of 286Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

Tags : threat management, cyberthreat, cybersecurity, kaspersky, it security, security management, network security, anti spyware
    
By: Kaspersky     Published Date: Feb 14, 2014

Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.

Tags : patch management, cybersecurity, firewalls, malware, hackers, virus, threats, network security
    
By: Citrix     Published Date: Dec 09, 2013

Android, iOS and Windows tablets and smartphones play an increasing role in enterprise computing, providing new flexibility and mobility for workers and IT—but creating new challenges around security. This paper describes these issues and explains how they can be addressed effectively with Citrix BYOD solutions.

Tags : citrix, byod, apple ios, windows, android, smarphones, tablets, secure delivery
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Citrix     Published Date: Oct 15, 2013

Explore ten reasons why virtual desktops should be the foundation of your layered approach to information security.

Tags : citrix, byod, secure data, mobile workers, mobile security, desktop virtualization, security, risk
    
By: Comcast     Published Date: Apr 26, 2013

Learn how to select the most optimal business Ethernet service in this 9 step guide that will show you how to meet your many application needs while reducing costs.

Tags : ethernet, wan, wide area network, productivity, business continuity, network, customer satisfaction, bandwidth management
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Black Lotus     Published Date: Apr 21, 2014

Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.

Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
By: Code 42     Published Date: Mar 20, 2014

Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.

Tags : code42 software, endpoint backup, data migration, data loss, data management, data risk, encryption, network security
    
By: Rapid7     Published Date: Mar 19, 2014

This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.

Tags : rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
By: Rapid7     Published Date: Mar 19, 2014

In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.

Tags : rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
By: Symantec     Published Date: Mar 14, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : symantec, security intelligence, attacks, cyber attacks, hackers, web security, data protection, targeted attacks
    
By: FireEye     Published Date: Feb 28, 2014

Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.

Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
By: Arbor Networks     Published Date: Feb 12, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors.

Tags : arbor, arbor networks, security management, firewalls, threats, hackers, internet security, network security
    
By: Lumension     Published Date: Feb 07, 2014

Being able to compare the impact of application control and traditional anti-virus solutions could help you improve your server's performance and security.

Tags : lumension, server performance, server security, application control, anti-virus solutions, endpoints, application control solution, malware
    
By: McAfee     Published Date: Jan 22, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : mcafee, gartner, endpoint protection, network security, application security, email security, hacker detection, intrusion prevention
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End

Related IT Whitepaper Topics

Access Control
856 Documents
Active Directory
165 Documents
Anti Spam
554 Documents
Anti Spyware
602 Documents
Anti Virus
667 Documents
Application Security
917 Documents
Authentication
378 Documents
Biometrics
116 Documents
Business Continuity
394 Documents
Cisco Certification
13 Documents
Cloud Computing
825 Documents
Clustering
105 Documents
Colocation and Web Hosting
225 Documents
Data Center Design and Management
548 Documents
DDoS
181 Documents
Disaster Recovery
510 Documents
Email Security
643 Documents
Encryption
487 Documents
Ethernet Networking
180 Documents
Firewalls
406 Documents
Hacker Detection
533 Documents
Infrastructure
827 Documents
Internet Security
981 Documents
Intrusion Detection
664 Documents
Intrusion Prevention
726 Documents
IPSec
171 Documents
Linux
90 Documents
Local Area Networking
224 Documents
Microsoft Exchange
124 Documents
Mobile Computing
425 Documents
Network Architecture
420 Documents
Network Management
645 Documents
Network Performance Management
379 Documents
Network Provisioning
211 Documents
Network Security Appliance
409 Documents
Password Management
244 Documents
PDA
116 Documents
Phishing
201 Documents
PKI
129 Documents
Remote Access
278 Documents
Remote Network Management
237 Documents
Risk Management
292 Documents
Secure Instant Messaging
195 Documents
Security Management
1110 Documents
Security Policies
468 Documents
Servers
473 Documents
Single Sign On
158 Documents
Small Business Networks
271 Documents
SSL
222 Documents
System Management Software
153 Documents
TCP/IP Protocol
175 Documents
Total Cost of Ownership
254 Documents
Tunneling
141 Documents
Web Service Security
367 Documents
WiFi
93 Documents
Windows Server
116 Documents
Wireless Application Software
204 Documents
Wireless Security
237 Documents
Wireless Service Providers
122 Documents
WLAN
74 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.