Your Search returned 0 results from our Editorial content

Sort By
  • Close-button

    Intrusion Detection and Prevention

   

Your Search returned 23 results from our White Paper Library

Sort By
  • Close-button

    Intrusion Detection and Prevention

McAfee

Intrusion Detection and Prevention

The Total Economic Impact™ Of McAfee’s Network Security...

In May 2009, McAfee, Inc., commissioned Forrester Research to examine the financial impact and potential return on investment (ROI) that an organization...


IBM

Database Management

Forrester – Your Enterprise Database Security Strategy 2010...

Enterprises must establish a database security strategy that goes beyond authentication, authorization and access control. The key to successful database...


Akamai

Internet Security

Akamai Security Capabilities Whitepaper

This whitepaper explains how Akamai helps organizations bolster the security of their Web-based assets, with capabilities ranging across the application,...


Symantec Corporation

Endpoint Security

Customer Success - Tree in The Glen

Treehouse in the Glen (www.treehouseintheglen.com), a certified Green toy store in Silicon Valley, replaced a variety of security solutions with Symantec...


Symantec Corporation

Endpoint Security

Small Business Endpoint Protection Performance Benchmarks...

Download the Passmark competitive benchmark report and check out how Symantec Endpoint Protection Small Business Edition performs against competing solutions....


Blue Coat

BYOD (Bring Your Own Device)

Solution Brief: Top Five Considerations for a BYOD Policy...

Though BYOD offers a new way of working and a host of benefits, it also presents a swathe of new security issues. See the top five considerations for a...


Cisco Systems, Inc.

BYOD (Bring Your Own Device)

Readiness Assessments: Vital to Secure Mobility

See how a security assessment can help your team address key policy, security, and management concerns—before you deploy.


Symantec Corporation

Endpoint Security

Gartner Magic Quadrant for Endpoint Protection Platforms...

Read this report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.


SSH Communications Security

Enterprise Data Privacy

Preventing Data Loss Through Privileged Access Channels...

This white paper focuses on how organizations facing these issues of privileged access can effectively balance cost, risk and compliance.


Citrix

Network Security

Citrix NetScaler A Powerful Defense Against Denial of Service...

The past couple of years have seen a marked resurgence of denial of service (DoS) attacks.


Previous 1 3

Blogs

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Do you use any voice/digital assistants to help you work?