White Papers: network security


Sort by: Date | Company | Title


Security in a Faster Forward World
By Akamai | 23/1/2014
Organizations today operate in a Faster Forward world, as they experience a shift towards an increasingly mobile workforce. Following this, an evolving stream of attackers are now targeting mobile devices where they can more easily access a larger number of high-value corporate and government assets. This paper will guide you through finding the right Web security partner that can improve efficiency while reducing risks and improving web experience.
Download this now


Reducing Costs With Next-generation Firewalls
By Palo Alto Networks | 14/11/2013
For enterprise IT security organizations, the evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. This paper examines three different organizations, the legacy infrastructure they replaced, the firewalls they deployed and the subsequent savings.
Download this now


Managing Web Security in an Increasingly Challenging Threat Landscape
By Webroot | 5/9/2013
Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.
Download this now


Benchmarks for Security - A Comparative Test
By Webroot | 5/9/2013
In a head to head comparison of 8 end-point security products, we look at which performs the best across crucial performance metrics - from installation time to memory usage. Download to find out which performs the best!
Download this now


Batten Down the Hatches! A Guide to Protecting Data in Motion
By Senetas | 17/5/2013
The risks facing high-speed data networks and unencrypted data while in motion are very real and on the rise. As information becomes one of the most valuable ‘off balance sheet’ assets, protection of that information and the investment in it is a paramount obligation of office-holders and management. Read now for a better understanding of the risks to data in motion.
Download this now


In Control at Layer 2: A Tectonic Shift in Network Security
By Senetas | 8/4/2013
Network hacking and corporate espionage are on the rise and set to intensify. Information security risks remain commonplace, and most organisations need to increase vigilance. This paper has analyses the realistic threats to fibre optic Ethernet networks – both at the LAN and WAN level. Read now.
Download this now


Why Encrypt? - Securing email without compromising communications
By Clearswift | 31/7/2012
There’s an old saying that a ship is safe in the harbour, but that’s not what ships are for. The same can be said of enterprise data. If a company’s success is increasingly determined by its ability to act on information, a fundamental requirement of that success is the enablement of unfettered communications between co-workers, partners and clients. Read more.
Download this now


The Need for Data Loss Prevention Now
By Clearswift | 31/7/2012
For many years, organisations have noted that the network is the computer. With that, the network is the data, as data is the gold. Imagine if it occurred that 500 office chairs were stolen, with asset tags. Not really such a big deal, as they are insured. But if a few gigabytes of data are lost from an organisation that can often mean significant impact and consequences. Read more.
Download this now


CISO Guide to Next Generation Threats - Combating Advanced Malware, Zero-Day and Targeted APT Attacks
By FireEye | 26/4/2012
Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and Web gateways.1 Today’s attacks look new and unknown to signature-based tools because the attacks employ advanced malware and zero-day vulnerabilities. To regain the upper hand against next-generation attacks, enterprises must turn to true next-generation protection: signature-less, proactive and real time. Read on.
Download this now


Application Usage and Risk Report on Enterprise Networks in Australia and New Zealand
By Palo Alto Networks | 22/3/2012
The data in this presentation is based on actual network traffic. Findings include: Number of social networking applications per organisation; Number of browser-based filesharing applications per organisation; filesharing use for entertainment or work and more. See the results of this Application Usage and Risk Report.
Download this now
Sign up now to get free exclusive access to reports, research and invitation only events.

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia