Network Security Appliance White Papers

Results 1 - 25 of 230Sort Results By: Published Date | Title | Company Name
By: Lenovo     Published Date: Oct 14, 2016

IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.

Tags : security, usb, endpoint protection, theft, it threat, internet security, network security appliance, vulnerability management
    
By: Cisco     Published Date: Oct 11, 2016

The Cisco® 2016 Midyear Cybersecurity Report—which presents research, insights, and perspectives from Cisco Security Research—updates security professionals on the trends covered in our previous security report while also examining developments that may affect the security landscape later this year.

Tags : cybersecurity, attackers, http, ransomeware, malware, hacker detection, internet security, network security appliance
    
By: IBM     Published Date: Oct 06, 2016

IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.

Tags : cyber security, intelligence, prevention, ibm, data protection, network management, hacker detection, internet security
    
By: Dell EMC     Published Date: Jul 05, 2016

This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system

Tags : data management, business practices, data center. data application, enterprise applications, security, performance management, network security appliance
    
By: Cisco     Published Date: Jun 16, 2016

Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.

Tags : security, technology, security tactics, data, application security, internet security, network security appliance, best practices
    
By: Avaya     Published Date: Jun 15, 2016

Solving critical healthcare IT challenges with software-defined networkingDigitization is changing healthcare forever as organizations look to deliver better quality services, improve patient safety and provide the highest levels of security. Healthcare IT leaders should look to leverage a software-defined network. Read the latest from ZK Research to learn more.

Tags : healthcare, information technology, networking, security, access control, authentication, network security appliance, productivity
    
By: Code42     Published Date: Apr 22, 2016

Read this whitepaper to find out strategic solutions to your data protection issues.

Tags : data protection, data control, code 42, data visibility, encryption, hacker detection, network security appliance, security management
    
By: MuleSoft     Published Date: Apr 13, 2016

Today everything truly is connected to everything, and APIs are the connection mechanisms. Many companies are finding that their use of APIs has accelerated over the past 12 months, and that it will continue to accelerate during the next 12 months. APIs aren't really a new technology; they've actually been around for a long time. What is new is that they are in far broader usage today than they have been in the past. As of late 2015, the ProgrammableWeb API directory listed more than 14,000 APIs. When thinking about designing and managing APIs, a number of important questions arise. Why are APIs so well used and what effect would they have on your business? What is the impact of the expanding API economy on both providers and consumers? What are API tools and how can an investment in tools be an extremely cost efficient foundation for production grade API use cases?

Tags : best practices, business optimization, business management, application management, enterprise application, business intelligence, api management, network security appliance
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.

Tags : citrix, cyberthreat, report, defense, network security, email security, firewalls, network security appliance
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper helps organizations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.

Tags : security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust
    
By: Entrust Datacard     Published Date: Dec 08, 2015

This whitepaper helps organisations to select the best PKI solution to meet their business and security needs. It outlines key questions to be considered during the selection process to ensure the aforementioned requirements are addressed.

Tags : security, pki, public key infrastructure, pki solutions, security applications, security needs, public key infrastructure guide, entrust
    
By: Aerohive     Published Date: Sep 25, 2015

SIMPLI-FI ENTERPRISE NETWORKING THURSDAY 8 OCTOBER 2015 AT 11:00 BST

Tags : wi fi security, security policies, cloud security, on-boarding of users, aerohive access point, network architecture, network security, internet security
    
By: Vectra Networks     Published Date: Aug 03, 2015

Learn how Vectra protects Tri-State’s corporate and subscriber data and prevents cyberattacks to the power grid.

Tags : utilities provider, cyberattack detection, vulnerability management, security management, it security, security solution, network breaches, false threats
    
By: Venafi     Published Date: Jul 27, 2015

Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.

Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
    
By: Venafi     Published Date: Jul 27, 2015

See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.

Tags : security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data
    
By: Venafi     Published Date: Jul 27, 2015

Read this important brief to learn how to maintain your cybersecurity and reduce risk.

Tags : sans, security controls, control requirements, cybersecurity, risk reduction, cryptographic devices, pki, data protection
    
By: BitSight Technologies     Published Date: Jul 23, 2015

Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.

Tags : vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards
    
By: IBM     Published Date: Jul 15, 2015

This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.

Tags : intelligence technology, security management, threat intelligence, intelligence protection, security solutions, compliance, internet security, intrusion detection
    
By: IBM     Published Date: Jun 16, 2015

Interactive guide to provide insights on the key actions to take to take to safeguard your reputation by security and resilience investments.

Tags : it risk management, compliance requirements, it risk management strategies, it solutions, security breach, hacker vulnerability, risk management tools, anti spam
    
By: Aerohive     Published Date: May 13, 2015

This ebook reveals how organisations can ensure a secure mobility platform that starts with a single AP.

Tags : wi-fi, mobility, security, mobile security, byod, mobility for staff, mobility for guests, mobility for byod
    
By: Seagate Technology     Published Date: Apr 14, 2015

Upgrading security systems to meet both current and future needs is no small feat. So when a Texas-based surveillance system integrator began work with a large national nonprofit foundation on its 20,000 square foot park-like property, existing infrastructure and future system deployment were primary considerations. With the objective to update the nonprofit’s Virtual Management Software (VMS) while leveraging existing analog and IP cameras, the system integrator needed a cost-effective solution to meet their current needs with the ability to scale for rapid growth. Download this case study to learn more about how the system integrator engaged with NUUO, a leading NVR and VMS manufacturer known for seamless integration of 3rd party cameras to build a customized system that would suit the nonprofit’s needs.

Tags : surveillance, security system, virtual management software, cameras, network performance management, intrusion prevention, network security appliance, security management
    
By: IBM     Published Date: Apr 09, 2015

IBM offers insights to CIOs regarding key security essentials for enabling mobility and BYOD.

Tags : ibm, security, risk management, mobile device security, network security appliance, security management, vulnerability management, mobile device management
    
By: IBM     Published Date: Apr 09, 2015

Integrated security intelligence solutions help organizations use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

Tags : ibm, integrated security, security weakness, risk management, infrastructure security, application security, firewalls, network security appliance
    
Start   Previous   1 2 3 4 5 6 7 8 9 10    Next    End