Computer Network Security White Papers

(View All Report Types)
Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by TechTarget Security
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

TechTarget Security

Content Delivery Networks Take on New Roles
sponsored by Limelight Networks, Inc.
WHITE PAPER: Content delivery networks (CDNs) can pave the way for using rich media in an enterprise but make sure you understand how it works. In this e-guide, Tom Nolle, President of CIMI Corporation dives into how CDNs work, their protection from denial of service attacks and the new mission for CDN providers.
Posted: 12 Dec 2016 | Published: 07 Dec 2016

Limelight Networks, Inc.

How Data Centers are Becoming Unwitting Accomplices in Advanced Cyber Attacks
sponsored by FireEye
WHITE PAPER: This white paper explores the widening gap between the offensive capabilities of today's cyber attackers and the weak traditional defenses deployed in most data centers.
Posted: 10 Mar 2014 | Published: 31 Dec 2013

FireEye

Strategies For Securing Virtualized Environments
sponsored by Sourcefire
WHITE PAPER: This whitepaper explores an effective virtualization security technology and outlines how it can ensure system wide security.
Posted: 03 Apr 2014 | Published: 31 Dec 2013

Sourcefire

What Will Security for the Network of the Future Look Like?
sponsored by Cisco Systems, Inc.
WHITE PAPER: This whitepaper takes a look at the future of data center infrastructure that addresses security concerns in an increasingly mobile world.
Posted: 07 Apr 2014 | Published: 24 Feb 2014

Cisco Systems, Inc.

Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center
sponsored by Citrix
WHITE PAPER: When it comes to the new demands of network infrastructure, it is critical to have an effective application device controller (ADC). This brief guide explores an effective ADC that can help improve your network performance and provide you with effective scalability solutions.
Posted: 13 May 2014 | Published: 06 Jan 2014

Citrix

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

Five Steps to Building Visibility and Security Into Your Network
sponsored by Ixia
WHITE PAPER: Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.
Posted: 03 Mar 2014 | Published: 31 Dec 2013

Ixia

Trust in Cyberspace
sponsored by (ISC)2 UK Ltd
WHITE PAPER: In this white paper, unveil a list of characteristics that define trusted software, which is critical to ensuring its quality and reliability as a secure product.
Posted: 26 Feb 2014 | Published: 26 Feb 2014

(ISC)2 UK Ltd

Building a Better Network Security Strategy
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise