Modern Network Security ArchitectureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Modern Network Security Architecture returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Virtualization
 •   Application Management and Maintenance
 •   Network Management
 •   Networks
 •   Wireless Technologies and Mobile Computing
 •   Service Oriented Architecture (SOA)
 •   Data Center Management
 •   IT Service Management (ITSM)/ IT Infrastructure Library (ITIL)
 •   Enterprise Systems Management

Related Searches
 •   Cycles Modern Network Security
 •   Finds Modern Network Security
 •   Industries Modern Network
 •   Industry Modern
 •   Modern Computer
 •   Modern Network Research
 •   Modern Network Security Migration
 •   Modern North Dakota
 •   Planning Modern Network Security
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Modern network security for modern threats by Palo Alto Networks

March 14, 2014 - (Free Research)
This exclusive paper discusses the current state of network security and examines a set of flexible solutions that account for changes to applications, threats, and users, providing air-tight security. 
(WHITE PAPER) READ ABSTRACT |

Clean VPN Approach to Secure Remote Access by SonicWALL

June 2008 - (Free Research)
In this whitepaper learn how integrating SonicWALL SSL VPN/Secure Remote Access, SonicWALL Network Security Appliance, and SonicWALL Global Management System solutions offer organizations a single solution for defense-indepth security. 
(WHITE PAPER) READ ABSTRACT |

Thwarting Sophisticated Attacks with Today’s Firewalls by SearchSecurity.com

February 2012 - (Free Research)
This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM). 
(EGUIDE) READ ABSTRACT |

Build a network perimeter for the mobile age by Palo Alto Networks

March 2014 - (Free Research)
This crucial paper examines how your organization can meet the challenges of securing and managing a modern network by embracing a perimeter model based on logical controls that consistently enforce enterprise policy wherever an asset is located. 
(WHITE PAPER) READ ABSTRACT |

Establishing Trust in Remote Access Transactions by ActivIdentity Corporation

October 2010 - (Free Research)
Most organizations are adding exposure points with growing laptop and smart phone populations seeking remote access. Static passwords are easily stolen. Strong authentication is needed. Read this white paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions by SonicWALL

April 2008 - (Free Research)
Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective. 
(WHITE PAPER) READ ABSTRACT |

A Foundation for Next-Generation Data Center Security by Citrix

September 2012 - (Free Research)
This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing datacenter infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Billing System Perspective: Convergence in Telecommunication by Comarch Telecommunications

June 2008 - (Free Research)
To achieve all modern telecommunication requirements it was necessary to change service delivery architectures as well as billing systems architectures. This paper examines the a billing solution that delivers on all of today's service providers needs. 
(WHITE PAPER) READ ABSTRACT |

TOGAF® and SABSA® Integration by ComputerWeekly.com

October 2011 - (Free Research)
This paper from the Open Group, documents an approach to enhance the TOGAF enterprise architecture methodology with the SABSA security architecture approach to create one holistic architecture methodology. 
(IT BRIEFING) READ ABSTRACT |

Next Generation Enterprise WAN DMVPN by Cisco Systems, Inc.

July 2012 - (Free Research)
Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so. 
(WHITE PAPER) READ ABSTRACT |

Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise by Cisco (E-mail this company)

October 2013 - (Free Research)
Access this white paper to take your first step toward an adaptable network platform –this enterprise network architecture provides the open, programmable, and application-aware foundation you need for today's mobile and cloud-connected world. 
(WHITE PAPER) READ ABSTRACT |

Cisco ONE Enterprise Networks Architecture: An Automated, Application-Aware Foundation for the Modern Enterprise by Cisco (E-mail this company)

October 2013 - (Free Research)
Access this white paper to take your first step toward an adaptable network platform –this enterprise network architecture provides the open, programmable, and application-aware foundation you need for today's mobile and cloud-connected world. 
(WHITE PAPER) READ ABSTRACT |

January 2013 Modern Infrastructure E-Zine by SearchDataCenter.com

January 2013 - (Free Research)
Access this informative e-zine to learn about the future of data center technologies and what you can expect to see moving forward. Read helpful articles on the latest data center trends and developments that can help you realize the benefits of the data centers of tomorrow. 
(EZINE) READ ABSTRACT |

Next Generation Service Integration Platform Oracle SOA Suite on Oracle Exalogic Elastic Cloud and Oracle Exadata Database Machine by Oracle Corporation

June 2013 - (Free Research)
In this comprehensive resource, find out how you can deliver high performing applications with low risk and easy manageability by leveraging next-generation service-oriented architecture (SOA) tools. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript:  Lessons Learned from Standardizing and Automating Network Management by Hewlett-Packard Company

December 2010 - (Free Research)
The implementation of new network technologies has increased our network security and performance but has also made network management more complex and costly. How can you overcome these difficulties without putting your network at risk? Read this presentation transcript and gain insight into modern management tools and best practices. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Future Of Mobile Application Development by Salesforce.com

January 2013 - (Free Research)
This  report focuses on the changes application developers need to understand if they want to build modern applications that deliver contextual customer experiences. It also looks at how modern applications will evolve over the next few years and what development teams should prepare for now. 
(ANALYST REPORT) READ ABSTRACT |

Taking Managed Security Services To The Next Level by Webroot

October 2013 - (Free Research)
This white paper discusses the changing IT security landscape, how MSPs will be impacted, and what they can do for their customers in the face of these security challenges. 
(WHITE PAPER) READ ABSTRACT |

Image-Based Data Protection: Simply Better Data Protection by Dell Software

January 2011 - (Free Research)
In this Quest Software white paper, see why image-based data protection is the next step in protecting your company’s critical data. Learn about the true value of moving to a image-based data protection virtual solution, including a solid return on investment, and how this new technology works in your current backup environment. 
(WHITE PAPER) READ ABSTRACT |

Epicor ICE 2.0: Introducing Next-Generation Business Architecture by Epicor Software Corporation

November 2008 - (Free Research)
Epicor Internet Component Environment (ICE) 2.0 is a modern business architecture and application framework which utilizes a 100% service-oriented architecture (SOA) and Web 2.0 technologies for a new breed of enterprise solution. 
(WHITE PAPER) READ ABSTRACT |

Five tips to reduce risk from modern web threats by Sophos, Inc.

April 2012 - (Free Research)
<p>To meet the challenges to your security, you need to put in place user education and awareness, preventive measures and a modern web security solution. This guide covers five essential preventive measures you should implement to reduce your risk and keep ahead of the threats.</p> 
(WHITE PAPER) READ ABSTRACT |

Application Modernization Handbook: Modernization and Business Transformation in the 21st Century by CA Technologies.

December 2012 - (Free Research)
Read this SearchSOA.com e-book to learn more the mainframe's evolving role in modern enterprise IT. Find out how leading companies are approaching modernization projects, and discover the surprising role that business process management (BPM) can play in modernization efforts. 
(EBOOK) READ ABSTRACT |

The Applications Handbook - a Guide to mastering the modern app lifecycle by Hewlett-Packard Company

December 2010 - (Free Research)
This e-book explains how to master the challenges of modern application delivery. 
(EBOOK) READ ABSTRACT |

Reasons to Modernize Your Middleware by Red Hat

June 2013 - (Free Research)
Aging and inflexible middleware can be hindering your organization in more ways than one, especially when it comes to change management. In this white paper, learn the key characteristics of a modern middleware platform and discover how you can benefit by migrating from a legacy middleware infrastructure to a more flexible, modular environment. 
(WHITE PAPER) READ ABSTRACT |

Choosing Hardware for Virtualization by SearchServerVirtualization

July 2013 - (Free Research)
Changes in IT combined with tightening budgets have made scalability essential in the data center. Learn how to select hardware that will help make the most of your virtual infrastructure. 
(EBOOK) READ ABSTRACT |

Modern Infrastructure July 2013 by SearchDataCenter.com

July 2013 - (Free Research)
The July issue of Modern Infrastructure covers the challenges of private cloud adoption, along with endpoint management and top-notch server and network design. 
(EZINE) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts