Network Security

Network Security consists of the provisions made in an underlying computer network infrastructure, policies adopted by the network administrator to protect the network and the network-accessible resources from unauthorized access and the effectiveness (or lack) of these measures combined together.
Results 301 - 325 of 419Sort Results By: Published Date | Title | Company Name
By: Firehost     Published Date: Jan 07, 2015
This Case Study gives information on the 16 Infrastructure Components to pass your next Audit.
Tags : firehost, intelligent security, infraestructure, security, network security, backup and recovery, access control, application security, security management, security policies, data protection, database security
     Firehost
By: Globalscape     Published Date: Mar 21, 2014
This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short of these needs. The paper then describes how Globalscape's software-only solution. (WAFS) provides file replication and collaboration across globally dispersed networks, securely and reliably, with the performance of local file sharing.
Tags : file sharing, wan optimization, high bandwidth, low overhead, file replication, autodesk, revit, wafs, file locking, version history, file integrity, network traffic, security, centralized backup, centralized management, bandwidth management, network management, network performance management, network security, traffic management
     Globalscape
By: Sponsored by HP and Intel ®     Published Date: Feb 21, 2013
HP CloudSystem Matrix enables organizations to realign traditional technology silos into virtual pools sharable by different applications and flexible enough to change as business needs evolve.
Tags : integrated, infrastructure, cloud it, public cloud, hybrid cloud, governance, network architecture, network management, network performance, network performance management, network security, cloud computing
     Sponsored by HP and Intel ®
By: CDW Vmware     Published Date: Aug 02, 2012
In today's competitive business landscape, users' needs are continuously changing. Employees want access to their data and applications anytime, anywhere, from any device. The journey to seamlessly integrate data and applications across all devices begins with desktop modernization.
Tags : modernize, desktop, data, application, access, device, seamlessly, integrate, modernization, cio, vmware, department, user, infrastructure, manage, migrate, new, platforms, distributed computing, internetworking hardware
     CDW Vmware
By: CDW Vmware     Published Date: Aug 02, 2012
Your business counts on you for reliable, secure, responsive IT services. It's a nonstop job, with no time off to figure out complex new technologies or wrestle with software solutions designed for larger firms. Virtualization is the way to simplify your IT without unnecessary complexity or cost.
Tags : ebook, reliable, secure, simplify, infrastructure, services, software, solutions, virtualization, vmware, faster, smarter, protection, vms, amd, accesible, mobile, flexible, fast, application
     CDW Vmware
By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper reviews the metrics and the technologies you should consider when migrating to the private cloud. Get your complimentary 10-page report now.
Tags : public, cloud, private, technologies, technology, public, equinix, gigaom, pro, zynga, cdn, applications, software, network, limelight, iaas, paas, saas, data, center
     Equinix
By: Citrix Systems     Published Date: Feb 18, 2012
This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Tags : virtualization, data center, datacenters, consolidate, network, network resources, citrix, netscaler, adc, application delivery controller, infrastructure, consolidation, networking, networking resources, convergence, grid computing, local area networking, migration, monitoring, network architecture
     Citrix Systems
By: Citrix Systems     Published Date: Feb 18, 2012
This paper outlines the compelling benefits of consolidating networking services, and details why competing efforts pursued by F5 technology come up short for critical ADC consolidation projects.
Tags : virtualization, data center, datacenters, consolidate, network, network resources, citrix, netscaler, adc, application delivery controller, infrastructure, consolidation, networking, networking resources, gigabit networking, interoperability, migration, monitoring, network architecture, network management
     Citrix Systems
By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : avocent, usb devices, security risk, usb lockdown, secure kvm switching, eal conformance, protection profile, universal serial bus, network security, remote access, remote network management, access control, ipsec, security management, mobile workers, wireless hardware, vulnerability management
     Avocent
By: File Transfer Consulting     Published Date: Jun 07, 2011
Examines IPv6 issues specific to file transfer applications, then tests 14 applications for readiness.
Tags : ipv6, managed file transfer, mft, file transfer, interoperability, compatibility, governance, internetworking hardware, ip networks, network architecture, network management, network security, tcp/ip protocol, test and measurement
     File Transfer Consulting
By: Liaison Technologies     Published Date: Jun 03, 2011
Download this eBook to learn how to protect sensitive data with tokenization, reduce PCI compliance scope cost, and complexity, and implement best practices for data protection.
Tags : liaison, nubridges, lawrence c. miller, tokenization, cissp, data protection, pci compliance, scope cost, pii, ehr, data breach, data security, audits, encryption, key management, network security, auditing, identity management, network security appliance, password management
     Liaison Technologies
By: Qualys     Published Date: Apr 05, 2011
This paper discusses the management of Risk and how Vulnerability Management is one of the few counter-measures easily justified by its ability to optimize risk.
Tags : it security, vulnerability management, risk management, qualysguard, risk optimization, countermeasure, threat, value, network management, network security, application security, security management, web service security, data protection, web service management
     Qualys
By: Kingston     Published Date: Feb 15, 2011
Learn how to balance the positive and negative effects of memory utilization in virtual infrastructures to better handle system workload and priority--while improving server utilization
Tags : virtualization, memory overcommitment, memory performance, memory reclamation, vmware, memory utilization, consolidation ratios, server memory, server utilization, memory ballooning, vmkernal swapping, capacity planning, vmware esx 4.0, active directory, bandwidth management, convergence, distributed computing, ethernet networking, fibre channel, gigabit networking
     Kingston
By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : network security, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention
     Focus
By: NetIQ     Published Date: Jan 12, 2011
This white paper discusses the growing demand for IT security auditing and why current approaches-manual procedures, scripts, and network vulnerability scanners- fail.
Tags : netiq, automating it security, audit, compliance, data protection, network vulnerability, secure configuration manager tool, automation, network security, auditing, network security appliance, business process automation, configuration management, vulnerability management
     NetIQ
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search White Papers      

Related Topics

Access Control
718 Documents
Active Directory
175 Documents
Anti Spam
609 Documents
Anti Spyware
674 Documents
Anti Virus
701 Documents
Application Security
1060 Documents
Authentication
408 Documents
Biometrics
117 Documents
Business Continuity
417 Documents
Cisco Certification
13 Documents
Cloud Computing
1322 Documents
Clustering
123 Documents
Colocation and Web Hosting
276 Documents
Data Center Design and Management
825 Documents
DDoS
204 Documents
Disaster Recovery
584 Documents
Email Security
585 Documents
Encryption
495 Documents
Ethernet Networking
192 Documents
Firewalls
447 Documents
Hacker Detection
541 Documents
Infrastructure
1162 Documents
Internet Security
1045 Documents
Intrusion Detection
659 Documents
Intrusion Prevention
737 Documents
IPSec
157 Documents
Linux
100 Documents
Local Area Networking
233 Documents
Microsoft Exchange
136 Documents
Mobile Computing
901 Documents
Network Architecture
696 Documents
Network Management
1013 Documents
Network Performance Management
560 Documents
Network Provisioning
237 Documents
Network Security Appliance
383 Documents
Password Management
225 Documents
PDA
121 Documents
Phishing
200 Documents
PKI
131 Documents
Remote Access
331 Documents
Remote Network Management
270 Documents
Risk Management
376 Documents
Secure Instant Messaging
173 Documents
Security Management
1233 Documents
Security Policies
487 Documents
Servers
565 Documents
Single Sign On
139 Documents
Small Business Networks
294 Documents
SSL
248 Documents
System Management Software
170 Documents
TCP/IP Protocol
185 Documents
Total Cost of Ownership
283 Documents
Tunneling
153 Documents
Web Service Security
403 Documents
WiFi
186 Documents
Windows Server
124 Documents
Wireless Application Software
301 Documents
Wireless Security
334 Documents
Wireless Service Providers
149 Documents
WLAN
147 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.