146 Results for:Network Security

  • Filter by: 

Real-Time Mainframe SIEM 101

sponsored by BMC Published: 14 May 2019 White Paper

SIEM systems have been the industry standard for enterprise network security, but the mainframe has been left out of this predominantly distributed discipline. In this white paper, learn how to launch a mainframe ...

View Now

Unified Threat Management: Locking Your Network Down

sponsored by Comcast Business Published: 30 Sep 2019 Webcast

While there is no end-to-end "silver bullet" in terms of security solutions, Unified Threat Management (UTM) offers a suite of technologies that can make it a foundational part your network security. In this ...

View Now

What's on Your Network?

sponsored by Aruba Networks Published: 20 Sep 2017 Resource

In this resource, find out how the closed-loop approach to network security allows IT professionals to deploy and retain control of IoT and BYOD devices to protect against security breaches.

View Now

Network Security for a New Era

sponsored by TechData - HPE Published: 21 Oct 2019 White Paper

Mobile devices and smart objects are connecting to the same school networks, but they have very different security needs. Read this report for how K-12 leaders can manage the new security challenges of mobile ...

View Now

A Revolution in Network Security Monitoring Is Underway: Are You Ready?

sponsored by Corelight Published: 04 Feb 2019 Webcast

Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a ...

View Now

CW Middle East ezine April 11 2019

sponsored by ComputerWeekly.com Published: 11 Apr 2019 Ezine

It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

View Now

11 Limitations of Network-Centric Security In The Cloud

sponsored by Lacework Published: 24 Sep 2018 Resource

Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report ...

View Now

The Power of Bro and Why You Should Include It in Your Security Infrastructure

sponsored by Corelight Published: 11 Feb 2019 Video

Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight explain the power of Bro (now known as Zeek), where it fits in the security landscape and how it can help incident responders do ...

View Now

A Network Operations Guide for Intent-Based Segmentation

sponsored by Fortinet, Inc. Published: 25 Feb 2019 White Paper

Download this white paper to learn more about Intent-based Segmentation and how it can help you effectively improve security posture, mitigate risks, and support compliance and operational efficiency—without ...

View Now

Four Ways to Improve Endpoint Security

sponsored by Fortinet, Inc. Published: 27 Aug 2018 White Paper

Endpoint devices continue to be one of the favorite targets for cyberattacks. To address this vulnerability, security leaders must integrate endpoint security into their network security architecture. In this white...

View Now