Network Firewall Management Reports

KineticD Security
sponsored by KineticD
WHITE PAPER: The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

KineticD

Managing a Growing Threat: An Executive’s Guide to Web Application Security
sponsored by IBM
WHITE PAPER: Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more.
Posted: 12 Mar 2010 | Published: 17 Dec 2007

IBM

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

Expert E-Book: Data Security and the Cloud
sponsored by TechTarget Security
EBOOK: This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

TechTarget Security

Polycom UC Intelligent Core: Scalable Infrastructure for Distributed Video
sponsored by Polycom, Inc.
WHITE PAPER: Video is leaving the dedicated video conference room and becoming a standard communication tool and part of the individual's daily workflow. In turn, this trend is having a profound impact on the scalability requirements of the visual communication system.
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Polycom, Inc.

Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by TechTarget Networking
EZINE: In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

TechTarget Networking

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
sponsored by ESET
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

ESET