Network Security White Papers

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 1 - 25 of 306Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Sep 04, 2014

Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.

Tags : arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs siem, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.

Tags : siem, sans, endpoint, red, correlación, integración, seguridad, security
    
By: McAfee     Published Date: Sep 04, 2014

El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.

Tags : siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.

Tags : ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas, security, network security
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab experts are releasing new research designed to assist you in your cyber security business decisions. “IT Security. Fighting the Silent Threat” is a global report into business attitudes and opinions on IT security. Download the report now to get quantifiable statistics about perceived versus real cyberattacks.

Tags : threat management, cyberthreat, cybersecurity, kaspersky, it security, security management, network security, anti spyware
    
By: Kaspersky     Published Date: Feb 14, 2014

Are you guarding the cyber security gaps with patch management? Download Kaspersky Lab’s latest whitepaper, Your Data under Siege: Guard the Gaps with Patch Management, to learn about: how cybercriminals are utilizing weaknesses in trusted applications to distribute malware.

Tags : patch management, cybersecurity, firewalls, malware, hackers, virus, threats, network security
    
By: Imprivata     Published Date: Dec 06, 2013

A complete Single Sign-On and Access Management solution that simplifies user experience and improves employee productivity.

Tags : sso, single sign on, single sign on authentication, two factor authentication, single sign on solutions, identity and access management, epcs, e-prescribing
    
By: Comcast     Published Date: Apr 26, 2013

Learn how to select the most optimal business Ethernet service in this 9 step guide that will show you how to meet your many application needs while reducing costs.

Tags : ethernet, wan, wide area network, productivity, business continuity, network, customer satisfaction, bandwidth management
    
By: Fireblade     Published Date: Aug 21, 2014

Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.

Tags : fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack
    
By: bitglass     Published Date: Aug 19, 2014

In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.

Tags : bitglass, saas, saas security, crm, microsoft, salesforce, identity theft, security breach
    
By: McAfee     Published Date: Aug 15, 2014

À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
By: McAfee     Published Date: Aug 14, 2014

Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.

Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
By: McAfee     Published Date: Aug 14, 2014

When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

See how this next generation firewall performed in real-life. ESG Lab puts the McAfee NGFW through the paces in this recent report.

Tags : esg, esg lab, firewall evaluation, firewall lab report, firewall test, next generation firewall, mcafee ngfw, security
    
By: Citrix     Published Date: Jul 25, 2014

In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.

Tags : network security, application security, compliance, email security, hacker detection, best practices, software compliance, pci compliance
    
By: Citrix     Published Date: Jul 25, 2014

After its extensive vendor evaluation, Gartner has recognized Citrix as a Leader, highlighting strengths in its mobile app portfolio that improve the user experience.

Tags : mobility management, citrix, mobile app, network security, remote access, mobile workers, smart phones, wireless infrastructure
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End

Related IT Whitepaper Topics

Access Control
811 Documents
Active Directory
165 Documents
Anti Spam
546 Documents
Anti Spyware
588 Documents
Anti Virus
647 Documents
Application Security
892 Documents
Authentication
352 Documents
Biometrics
103 Documents
Business Continuity
378 Documents
Cisco Certification
13 Documents
Cloud Computing
877 Documents
Clustering
110 Documents
Colocation and Web Hosting
230 Documents
Data Center Design and Management
560 Documents
DDoS
171 Documents
Disaster Recovery
496 Documents
Email Security
612 Documents
Encryption
462 Documents
Ethernet Networking
180 Documents
Firewalls
391 Documents
Hacker Detection
502 Documents
Infrastructure
830 Documents
Internet Security
941 Documents
Intrusion Detection
643 Documents
Intrusion Prevention
705 Documents
IPSec
155 Documents
Linux
86 Documents
Local Area Networking
224 Documents
Microsoft Exchange
129 Documents
Mobile Computing
467 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance Management
385 Documents
Network Provisioning
211 Documents
Network Security Appliance
382 Documents
Password Management
226 Documents
PDA
116 Documents
Phishing
188 Documents
PKI
112 Documents
Remote Access
280 Documents
Remote Network Management
236 Documents
Risk Management
294 Documents
Secure Instant Messaging
175 Documents
Security Management
1072 Documents
Security Policies
431 Documents
Servers
484 Documents
Single Sign On
138 Documents
Small Business Networks
269 Documents
SSL
211 Documents
System Management Software
153 Documents
TCP/IP Protocol
173 Documents
Total Cost of Ownership
248 Documents
Tunneling
141 Documents
Web Service Security
367 Documents
WiFi
94 Documents
Windows Server
117 Documents
Wireless Application Software
211 Documents
Wireless Security
250 Documents
Wireless Service Providers
121 Documents
WLAN
74 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.