144 Results for:Network Security

  • Filter by: 

Quantifying the Operational and Security Results of Switching to Forcepoint NGFW

sponsored by Forcepoint Published: 31 May 2017 Research Content

The distributed nature of many organizations and the changing nature and scale of threats are creating new pressures related to network security. In this IDC study, learn how Forcepoint Next Generation Firewall can...

View Now

10 Capabilities to Look For in an MDR Solution

sponsored by Arctic Wolf Networks, Inc. Published: 14 Mar 2018 Resource

Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) ...

View Now

Securing Applications in the Cloud

sponsored by Cloudflare Published: 18 Jan 2019 White Paper

In this white paper, explore a network security tool designed to help you remain secure and 'always-on' by providing intelligent security at scale, and layered defenses to protect against DDoS, data theft and ...

View Now

Data Breach: Security Investigation, Detection and Rapid Response

sponsored by Splunk Published: 01 May 2017 White Paper

Discover the specific items to investigate when there is a security incident alert, what your analysts need to determine during a breach to mitigate further damage, the 6 most common steps in determining the impact...

View Now

Versa Networks Secure Cloud IP

sponsored by Versa Networks Published: 21 Sep 2018 Resource

Today, with SD-WAN and software-based security services, enterprises can transition from legacy WANs to a modernized WAN and branch network architecture. Download this resource to learn how a Secure Cloud IP ...

View Now

Proactive Security: Software vulnerability management and beyond

sponsored by ComputerWeekly.com Published: 17 May 2019 eGuide

In this e-guide we discover why modern security professionals are moving to a more pro-active approach to cyber defence, and how managing vulnerabilities is a key element of that.

View Now

A Technical Introduction to Bro: Network Security's Best Kept Secret

sponsored by Corelight Published: 06 Feb 2019 Webcast

Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.

View Now

Network Security with 128 Technology

sponsored by 128 Technology Published: 22 Oct 2019 White Paper

Learn about 128 Technology’s approach to zero trust and how it can protect you in this white paper.

View Now

Dramatically Reduce Incident Response Time with Splunk® and Bro

sponsored by Corelight Published: 07 Feb 2019 Product Overview

Watch this webcast to learn about open-source network security monitor Bro—now known as Zeek—which turns network traffic into high-fidelity data streams that summarize and organize network events by protocol.

View Now

How the Gigamon Insight Solution Can Help Secure Medical Devices

sponsored by Gigamon Published: 05 Sep 2019 White Paper

As the number of medical devices being used in HDOs' networks increase, so too does the number of targets for threat actors. In this white paper, learn about a passive network security monitoring solution and how ...

View Now