Computer And Network Security White PaperWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Computer And Network Security White Paper returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Monitoring
 •   Virtualization
 •   Wireless Security
 •   Network Management
 •   Networks
 •   Security Policies
 •   Storage Security

Related Searches
 •   Backup Computer
 •   Computer And Monitor
 •   Computer And Network Introduction
 •   Computer And Network Tools Software
 •   Computer And Samples
 •   Computer Payment
 •   Computer Spreadsheets
 •   Integrated Computer
 •   Repair Computer
 •   Rfi Computer
Advertisement

ALL RESULTS
1 - 25 of 498 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Closing Wireless Loopholes for PCI Compliance and Security by AirMagnet

December 02, 2009 - (Free Research)
Merchants who process payment cards need dedicated wireless monitoring systems that offer full traffic analysis and comprehensive security solutions to identify wireless security loopholes, provide solutions, and document compliance for audits. Read this white paper to learn more about ensuring PCI compliance in your wireless network. 
(WHITE PAPER) READ ABSTRACT |

Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks by Palo Alto Networks

August 31, 2013 - (Free Research)
In this valuable resource, discover a security platform designed to keep up with today's ever-evolving threat landscape, which offers optimum network security without lowering network performance or reducing business productivity. 
(WHITE PAPER) READ ABSTRACT |

Delivering Secure Guest Access and Mobile Internet Device (MID) Management with HiveOS 4.0 by Aerohive Networks

July 18, 2011 - (Free Research)
Mobile devices give workers the ability to access critical information anytime, anywhere. Despite the obvious benefits for productivity, network accessibility has also become a serious security concern – especially in the healthcare community. Learn about a cloud-enabled network security approach that helps safeguard confidential patient data. 
(WHITE PAPER) READ ABSTRACT |

Simplify VMware vSphere* 4Networking with Intel® Ethernet 10 Gigabit Server Adapters by Intel

July 05, 2011 - (Free Research)
Server virtualization can quickly result in excessively complex network ports if you don't have a plan. This white paper explores the factors that can lead to GbE port bloat, including physical server connection paradigms and security procedures.  
(WHITE PAPER) READ ABSTRACT |

Interop Turns to Enterasys for Easy to Manage Network Backbone by Enterasys

March 29, 2010 - (Free Research)
Enterasys has what it takes to run the world's largest temporary network and deliver 100% availability with centralized visibility and control. For the third consecutive year, Enterasys has been selected as the InteropNet network provider for 2010. This white paper shares insight and details into Enterasys' continuing support for InteropNet. 
(WHITE PAPER) READ ABSTRACT |

Gunner Peterson's Security Gateway Buyer’s Guide by Intel

March 25, 2011 - (Free Research)
Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations. 
(WHITE PAPER) READ ABSTRACT |

10 Things Your Next Firewall Must Do by Palo Alto Networks

August 19, 2013 - (Free Research)
This valuable resource highlights the renewed focus on firewalls to improve security given the increasing complexities in network architectures. Click now to explore next-generation firewalls, and 10 things that they must do to protect your organization. 
(WHITE PAPER) READ ABSTRACT |

Achieve Network Visibility and Control with Firewall Traffic Classification by Palo Alto Networks

March 21, 2014 - (Free Research)
In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies. 
(WHITE PAPER) READ ABSTRACT |

Security in Cloud Computing by Intel

October 04, 2011 - (Free Research)
The cloud’s virtual environment raises many security concerns in businesses, putting intense pressure on IT professionals to enhance security systems. Access this white paper to discover how you can use technology to take control of the security risks in your enterprise. 
(WHITE PAPER) READ ABSTRACT |

MegaPath Site-to-Site MPLS VPN by MegaPath Inc.

March 30, 2010 - (Free Research)
Your employees in remote locations need the same fast, reliable, secure and cost-effective access to information and applications as your employees at headquarters. MegaPath Site-to-Site MPLS VPN is the simple solution. Read this white paper to learn how to MegaPath Site-to-Site MPLS VPN means more security, more selection, and more service. 
(WHITE PAPER) READ ABSTRACT |

Intel Storage Technologies: Powering Tomorrow’s Cloud by Intel

October 04, 2011 - (Free Research)
Storage technology can ensure that systems are prepared for a virtual environment in the cloud. Access this white paper to learn how to implement solutions that will provide added data protection and security for your enterprise. 
(VIDEOCAST) READ ABSTRACT |

5 Things You Need to Know About iPad in the Enterprise by GroupLogic

September 06, 2011 - (Free Research)
The increase of iPads in the work setting brings with it a number of security concerns and risks that enterprises must address. View this white paper to discover the top 5 things you need to know about iPads and integrating them into an enterprise setting, and explore how to protect your corporate assets and mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

Making the Right Move to a Managed Service Provider for SSL VPN by MegaPath Inc.

March 26, 2010 - (Free Research)
Adoption of SSL VPNs is growing rapidly. A sample of areas in which SSL VPNs can help include serving more communities, supporting more access environments, providing access without application and network changes, enforcing compliance, protecting the network, quickly modifying access policies, and ensuring business continuity. 
(WHITE PAPER) READ ABSTRACT |

XML Threat Model for REST, SOA and Web 2.0 by Intel

September 08, 2011 - (Free Research)
This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL]. 
(WHITE PAPER) READ ABSTRACT |

Regain Visibility and Control with Cost-effective Next-Generation Security by Palo Alto Networks

August 31, 2013 - (Free Research)
This resource overviews a next-generation security platform that offers clear visibility and improved control over users, applications, and content. Click now to see how 3 businesses fared after deploying this solution, including immense cost and operation reduction benefits. 
(WHITE PAPER) READ ABSTRACT |

Meeting the challenges of virtualisation security by Trend Micro

August 01, 2009 - (Free Research)
Your organisation needs to consider which security mechanisms can best protect both physical and virtual servers, particularly as a virtualised architecture fundamentally affects how mission-critical applications are designed, deployed and managed. Download this white paper to find out more about real solutions to these challenges. 
(WHITE PAPER) READ ABSTRACT |

Server and Application Protection - Behind the Lines by Trend Micro

February 01, 2009 - (Free Research)
For organizations evaluating the benefits of server and application protection systems and making a case for incorporating them into the IT infrastructure, Trend Micro recommends examining nine different areas of business interest. This white paper details these topics and examines Trend Micro server and application protection software. 
(WHITE PAPER) READ ABSTRACT |

Cloud Security Insights for IT Strategic Planning by Intel

April 25, 2012 - (Free Research)
Cloud computing offers many benefits, but it's hard to ignore the security challenges that this dynamic environment can introduce. To combat these risks, you need an effective cloud security strategy in place. This white paper reviews key findings from a survey of 200 IT pros that can help you maximize data protection in the cloud. 
(WHITE PAPER) READ ABSTRACT |

Security in Cloud Computing by Intel

October 31, 2011 - (Free Research)
New and improved technologies can improve cloud security and smooth the transition in your enterprise. Access this white paper to learn how these solutions can allow your business to take advantage of all the cloud has to offer while maintaining a secure infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Powering Tomorrow’s Cloud – An Overview by Intel

October 04, 2011 - (Free Research)
While a move to the cloud can benefit most enterprises, it is often time consuming and burdensome on your budget. Access this white paper to learn how to utilize technologies to optimize your cloud experience. 
(VIDEOCAST) READ ABSTRACT |

Business Risk and the Midsize Firm: What Can Be Done to Minimize Disruptions? by HP & Intel®

March 21, 2011 - (Free Research)
While it is clear that midsize businesses must prepare for disasters just as larger enterprises do, very few have actually taken action. What are the critical steps for disaster preparedness? Read this paper for that information. 
(WHITE PAPER) READ ABSTRACT |

Integrating security with HP TippingPoint by HP & Intel®

November 30, 2012 - (Free Research)
Access this resource to explore the key features of an intrusion prevention system (IPS) solution that keeps highly-virtualized, hybrid-delivered cloud services secure while ensuring top delivery performance. 
(WHITE PAPER) READ ABSTRACT |

Securing the Foundation of Information Technology (IT) Systems by Trusted Computer Solutions

January 12, 2010 - (Free Research)
This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process. 
(WHITE PAPER) READ ABSTRACT |

Resource Protection in Virtualized Infrastructures by Intel

September 03, 2009 - (Free Research)
This paper provides an overview of security concerns and considerations that organizations must address when implementing virtualization. 
(WHITE PAPER) READ ABSTRACT |

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls by Palo Alto Networks

November 12, 2012 - (Free Research)
This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 498 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts