Network Security ProfessionalWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Network Security Professional returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Application Security
 •   Security Policies
 •   Endpoint Security
 •   Security Monitoring
 •   Managed Security Services
 •   Wireless Security
 •   Anti-Virus Solutions
 •   Firewalls

Related Searches
 •   Automate Network
 •   Automated Network Security
 •   Decisions Network
 •   Measured Network
 •   Network Case
 •   Network Security Professional Address
 •   Network Security Professional Web Cast
 •   Network Security Technology
 •   Planner Network Security
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The 2008 (ISC)2 Global Information Security Workforce Study by ISC2

May 2008 - (Free Research)
Information security professionals are facing a growing amount of pressure. This survey provides detailed insight into the important trends and opportunities emerging in the information security profession worldwide. 
(WHITE PAPER) READ ABSTRACT |

Efficacy of Emerging Network Security Technologies by ComputerWeekly.com

April 2013 - (Free Research)
The report, which surveyed 4,774 global IT and IT security professionals across nine countries identifies the challenges enterprises are facing dealing with emerging security threats. 
(IT BRIEFING) READ ABSTRACT |

E-Guide: Enterprise UTM Security: The Best Threat Management Solution? by NETGEAR Inc.

December 2010 - (Free Research)
If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise. 
(EGUIDE) READ ABSTRACT |

The Hidden Challenges of Securing a Virtual Environment by Stonesoft Inc.

March 2008 - (Free Research)
The purpose of this paper is to arm security professionals and IT leaders with a solid understanding of the potential risks of not incorporating new security technologies into their virtual environments. 
(WHITE PAPER) READ ABSTRACT |

Provide Better Visibility and Manageability across Network Security Tools by WatchGuard Technologies, Inc.

September 2013 - (Free Research)
Access this analyst report to explore what IT security professionals need in security tools given the significant growth of sophisticated cyber-attacks in an increasingly complex IT environment. 
(ANALYST REPORT) READ ABSTRACT |

IBM's Approach to Advanced Persistent Threats by IBM

August 2012 - (Free Research)
Access this video to learn more about advanced persistent threats (APTs) and how to address them. Topics covered the nature of APTs, preventative measures to take, and how professionals are addressing this challenge. 
(VIDEO) READ ABSTRACT |

The CISO's Guide to Virtualization Security by Rapid7

January 2012 - (Free Research)
Security incidents that occur in a virtual environment can cause significant, sometimes crippling damage to businesses. It's essential that security professionals outline their efforts and making securing virtual infrastructure a priority. 
(WHITE PAPER) READ ABSTRACT |

November Information Security Magazine - Re-architect Your Provisioning System Into a First Line of Defense for Access Management by Information Security Magazine

November 2010 - (Free Research)
November's edition of Information Security Magazine covers a variety of IT security related topics. Check out this e-zine to learn about re-architecting your provisioning system, meeting mandates in the cloud, how the economy is affecting information security professionals, and much more! 
(EZINE)

eGuide: Top Defense Strategies and Security Considerations for Unified Communications (UC) by IPC Systems, Inc.

August 2009 - (Free Research)
Organizations turn to unified communications as a cost-effective alternative to traditional communication systems. But security professionals often struggle with the problem of securing VoIP and unified communications. Read this expert E-Guide and discover unified communications infrastructure threats and basic techniques for addressing them. 
(E-LEARNING TUTORIAL) READ ABSTRACT |

How to Protect Your Critical Resources with Identity-based Access Control by AEP Networks

April 2008 - (Free Research)
This paper addresses the concerns facing network security architects and introduces AEP IDpoint as an advanced IBAC solution that meets datacenter security needs and satisfies modern business security challenges. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Preventing and detecting security vulnerabilities in Web applications by BlueCoat

July 2011 - (Free Research)
The extent of fundamental security flaws in most applications often requires a re-architecture, but there are some secondary measures information security teams can take to safeguard faulty applications. This expert tip maps out the steps security professionals should take to lock down their Web applications. 
(EGUIDE) READ ABSTRACT |

Computer Weekly 8 November 2011: Read this week's issue of the UK's leading technology publication, with the news, analysis and opinion that matters to IT managers. by ComputerWeekly.com

November 2011 - (Free Research)
In this week's Computer Weekly, we report from the London Cyberspace Conference where world leaders gathered to discuss internet security. We examine the tools available to help migrate from Windows XP to Windows 7; and hear from Royal Bank of Scotland about how to build a business case for virtual desktops. Download the new issue now. 
(EZINE)

Enterprise antimalware excess? Managing antimalware security products by SearchSecurity.com

April 2012 - (Free Research)
Antimalware products implemented on your networks can pile up overtime. And while layered security is traditionally the best way to mitigate risk, this accumulation can lead to a confusing, costly and inefficient mess. Access this guide for expert tips on how to manage antimalware products and determine how much is enough. 
(EGUIDE) READ ABSTRACT |

Global Business Gets Continuous Worldwide Network Protection by Dell SecureWorks UK

May 2012 - (Free Research)
In this case study, find out how one organization's investments in an intrusion detection system (IDS) and continuous firewall are providing them with comprehensive protection that doesn't negatively impact network performance – read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

Bringing the Network Perimeter Back From the 'Dead' by Symantec Corporation

December 2012 - (Free Research)
There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more. 
(EGUIDE) READ ABSTRACT |

Five Threats to Data Security and How to Protect against Them by SafeNet, Inc.

September 2008 - (Free Research)
The purpose of this paper is to examine five specific risks to data security, showing where and how confidential data may be vulnerable - and how you can protect your business against these threats. 
(WHITE PAPER) READ ABSTRACT |

Information Security Magazine - February 2013 by SearchSecurity.com

February 2013 - (Free Research)
In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more. 
(EZINE) READ ABSTRACT |

2012 Bit9 Cyber Security Research Report by Bit9, Inc.

May 2012 - (Free Research)
Bit9 conducted a survey on 1,861 IT and security professionals worldwide to examine their current views on today’s evolving threat landscape and their stance against them. View this report for a summary of the overall results as well as key findings, and find out how you compare to your peers. 
(WHITE PAPER) READ ABSTRACT |

Open, Manage, and Accelerate SSL Encrypted Applications by BlueCoat

September 2007 - (Free Research)
Enterprise users and their data have never been further apart. Business pressures that keep employees out of headquarters and close to customers and partners have met head-on with other drivers that are bringing far flung servers back to the datacenter. 
(WHITE PAPER) READ ABSTRACT |

Acumin Contract Rate Index August 2012 by ComputerWeekly.com

September 2012 - (Free Research)
Check out the daily contract rates for IT security professionals in this research from Acumin and Computer Weekly. 
(ESSENTIAL GUIDE) READ ABSTRACT |

TechTarget ANZ Securing Virtualised Data Centres E-Book by Trend Micro

August 2010 - (Free Research)
Virtualisation is powerful, but also creates challenges for the security processes and products organisations defined before they started to virtualise. This e-book explains these new security challenges posed by virtualisation and how security professionals and IT managers can address them. 
(EBOOK) READ ABSTRACT |

Information Security E-Zine – June 2014 by SearchSecurity.com

June 2014 - (Free Research)
Global threat intelligence services have continued to evolve and play more of role in SIEM and endpoint security products. How can threat intelligence benefit risk scenarios? 
(EZINE) READ ABSTRACT |

Security Predictions for 2012 by Websense, Inc.

January 2012 - (Free Research)
This pivotal resource offers valuable insight into 7 security predictions for the coming year, as well as ways in which your organization can prepare for whatever lurks on the horizon. 
(WHITE PAPER) READ ABSTRACT |

Expert E-Book: Data Security and the Cloud by SearchSecurity.com

February 2011 - (Free Research)
This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing. 
(EBOOK) READ ABSTRACT |

All Qualified Security Assessors Are Not Created Equal by AT&T Corp

August 2010 - (Free Research)
The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and service providers to undergo an onsite assessment of their security systems and procedures annually. This assessment is typically performed by a Qualified Security Assessor (QSA). This paper provides criteria to consider in choosing a QSA for your assessment 
(WHITE PAPER)

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts