Network Security Appliance White Papers

Results 1 - 25 of 191Sort Results By: Published Date | Title | Company Name
By: McAfee, Inc.     Published Date: Jun 03, 2014

Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.

Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods

Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus
    
By: Riverbed     Published Date: Apr 03, 2014

The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them.

Tags : riverbed, npm, network performance management, performance management, network management, networking, performance tools, security
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: Cisco     Published Date: Jun 12, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why itís critical for SMEs to protect all endpoints Ė not just mobile devices Ė in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Citrix     Published Date: May 08, 2014

A white paper on the increasing mobility of organisations and the technology available to facilitate and secure throughout this change.

Tags : enterprise, mobility, security mobility, citrix, netscaler, application security, internet security, network security appliance
    
By: Kaspersky     Published Date: Apr 24, 2014

This paper aims to provide guidance on identifying the right security approach for your virtual environment, achieved through the correct balance between security and performance.

Tags : security, virtualization, security approaches, kaspersky, anti spam, anti spyware, anti virus, application security
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: Cisco Systems     Published Date: Dec 23, 2013

Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now

Tags : cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Rapid7     Published Date: Oct 09, 2013

Learn how our top-rated vulnerability assessment solution, Nexpose, and our new endpoint controls monitoring solution, ControlsInsight, help you accurately assess your defenses, make informed decisions, create credible action plans, and monitor ongoing progress.

Tags : gartner, marketscope, rapid7, vulnerability assessment, 2013, security, it landscape protection, network security
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn how Kuoni Travel teamed up with HP and used their TippingPoint to help customers handle threat landscape effectively, protecting both agents and customers

Tags : kuoni travel, hp tippingpoint, threat landscape, threats, travel, application security, internet security, intrusion prevention
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn how the CIO of the United Arab Emirates University community addressed the major challenges faced by the University's network security professionals.

Tags : united arab emirates, united arab emirates university, network security, security, network, internet security, network security appliance, security management
    
By: IBM     Published Date: Sep 09, 2013

Learn about IBM's worldwide security operations and receive their free analysis of cyber security attacks and incident data

Tags : ibm security services, ibm, security services, cyber security intelligence, cyber security, index, cyber security intelligence index, application security
    
By: IBM     Published Date: Sep 09, 2013

Learn IBM's 4 free tips that will help keep your organization safe

Tags : security attacks, ibm, apt, firewall, data, networks, infrastructure, application security
    
By: IBM     Published Date: Sep 09, 2013

Read this free whitepaper from Forrester Consulting's recent assessment of the current security skills landscape and what they think is the best way to overcome it

Tags : technical security skills, security skills, crisis, forrester consulting, security skills landscape, ciso, anti virus, application security
    
By: Dextra Technologies     Published Date: Aug 30, 2013

Itís no longer sufficient talk about the importance of mobility for IT-enabled operations. Instead, think about the concept of pervasive mobility, where the current generation of traditional devices like notebooks are augmented, and perhaps eventually replaced, by a new armada of consumer-class devices at the edge of the network. In fact, the bulk of information now being created and stored on corporate networks comes from notebooks, tablets and smartphones.

Tags : best practices, pervasive mobility, information technology, mobile, network, gadgets, consumer class devices, smartphones
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

While mobile threats are still largely mischiefware and have not yet broken the deviceís security model but instead more focused on for-pay texting scams or stealing personal information, the dangers are still rife. This white paper from BlueCoat examines the mobile threat landscape and the behavioral patterns of mobile users that make them most vulnerable to data loss, malicious applications, fraud and other mobile threats.

Tags : mobile, malware, security, scams, bluecoat, data loss, anti spam, anti virus
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

For decades, fear has dominated the discussion of cyber security. Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios. The result is that most IT shops and security vendors think security is only about what you prevent. They think itís about blocking, prohibiting, controlling, constraining, excluding, outlawing, and forbidding. Hence ITís reputation as the ďDepartment of No.Ē

Tags : security, business, cyber security, application security, email security, firewalls, internet security, network security appliance
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

Given the new threats inherent in an increasingly mobile workforce and the blurring of lines between business and personal use of devices, it is clear that conventional methods of securing the perimeter in this new environment are not up to the task. This white paper from BlueCoat explains how organizations can most effectively maximize their security efforts by incorporating a cloud-based solution as part of a unified approach.

Tags : web security, mobile, workforce, bluecoat, security, access control, application security, firewalls
    
By: Blue Coat Systems     Published Date: Jul 18, 2013

CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, itís not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.

Tags : web security, appliance, virtual, physical, saas, hybrid, access control, application security
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End