132 Results for:Network Security

  • Filter by: 

Securing Applications in the Cloud

sponsored by Cloudflare Published: 18 Jan 2019 White Paper

In this white paper, explore a network security tool designed to help you remain secure and 'always-on' by providing intelligent security at scale, and layered defenses to protect against DDoS, data theft and ...

View Now

Securing Cloud Transformation with a Zero Trust Approach

sponsored by Zscaler Published: 20 Aug 2019 White Paper

Cybersecurity wasn't designed for the cloud, and even though traditional network security solutions are being retrofitted for "cloud" usage, security is getting in the way of the adoption of zero trust strategies. ...

View Now

Case Study: Global Law Firm Unlocks New Threat Hunting Capabilities

sponsored by Corelight Published: 25 Jan 2019 Case Study

When an international law firm wanted to expand its threat hunting capabilities through analysis technique with network visibility, they decided on Bro Network Security Monitor. However, after realizing they ...

View Now

Adopting a Zero Trust Model: Google Did It, Can You?

sponsored by Zscaler Published: 27 Apr 2018 Webcast

In this webinar hear from Ameet Jani, Product Manager at Google Cloud and Manoj Apte, Chief Strategy Officer at Zscaler as they talk about zero-trust security, and how to take a user and application-centric ...

View Now

Securing the Cloud-Enabled Branch

sponsored by Zscaler Published: 11 Oct 2018 White Paper

With SD-WAN, traditional network security measures can't always keep up – they simply weren't designed to. Find out how to update security and traffic management for SD-WAN so you can support secure branch ...

View Now

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption

sponsored by Corelight Published: 21 May 2019 White Paper

The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source...

View Now

Case Study: How Corelight Cured an Energy Company's SOC of a Serious SMB Headache

sponsored by Corelight Published: 25 Jan 2019 Case Study

One of the world's largest energy companies was searching for a network traffic analysis tool that could provide real-time visibility across multiple offices. In this case study, read about how company decided on a...

View Now

Evolving Micro-Segmentation for Preventive Security: Adaptive Protection in a DevOps World

sponsored by VMware Published: 16 Sep 2019 Analyst Report

Download this SANS research white paper to learn about evolving micro-segmentation for preventive security.

View Now

Network Security, SD-WAN Suppliers Revamp Branch Security

sponsored by Cisco Umbrella Published: 29 Aug 2019 eGuide

In this expert guide, learn about new ways to integrate network security and SD-WAN to re-vamp your security strategy.

View Now

11 Limitations of Network-Centric Security In The Cloud

sponsored by Lacework Published: 24 Sep 2018 Resource

Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report ...

View Now