Skip Links

Network World

  • Tests
  • White Papers
  • Webcasts
  • Solution Centers

Resource Library

Topic
  • All
  • Cloud Computing
  • Corporate Issues
  • Data Center
  • E-commerce
  • Gaming
  • General
  • Industry Verticals
  • Infrastructure Management
  • LAN & WAN
  • Security
  • SMB Networking
  • Software
  • Unified Communications
  • Wireless
Resource Type
  • All
  • Webcast
  • White Paper
  • Our researchers looked ahead so your defenses won't fall behind.
    Source: Websense, Inc.
    White Paper: Information security only grows more complex. It's challenging to anticipate what the next advanced threat will be and when it might happen. Fortunately, Websense can help.

    In the "Websense® 2013 Security Predictions" report, Websense Security Labs™ researchers highlight key threats to prepare for in the coming year. Their security intelligence was sourced from the Websense ThreatSeeker® Network, the world's largest threat intelligence network, as well as rigorous analysis of technology and trends.
    Use these seven predictions to:
    * Review current defenses.
    * Identify security gaps.
    * Put new safeguards in place.

    This report also includes articles on mobile security, email security and Java exploits to help you further prioritize and plan for your security needs.
  • Smart Security for Escalating Challenges
    Source: Dell SonicWall
    White Paper: Traditional firewalls cannot keep up with the demands of today's networks. IT administrators face multiple challenges in keeping their organizations secure and ensuring that critical applications get the bandwidth they need, while limiting the bandwidth that unessential applications consume. This eBook examines how CSOs and IT managers are solving these issues using next-generation firewalls.
  • Why Protection and Performance Matters
    Source: Dell SonicWall
    White Paper: Outdated firewalls can pose serious security risks and simply adding malware protection inhibits performance. Dell SonicWALL Next-Generation Firewalls overcome these limitations with multi-core architecture and Reassembly-Free Deep Packet Inspection for unrivaled protection and performance.
  • Strategy guide to business protection for hospitals
    Source: HP & Intel
    White Paper: Learn more about HP Business Protection, which offers select, preconfigured disaster recovery solutions, helps hospitals manage risk and keep critical IT infrastructure up and running. HP Business Protection is based on HP Converged Infrastructure, an integrated platform comprising servers, storage, networking, management software, PCs and printers that helps provide high availability, data protection, network security and off-site disaster recovery.

    Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.
  • Easily Secure Use of Cloud Apps. Even the Unknown Ones.
    Source: McAfee
    White Paper: Easily secure use of cloud apps. Even those you don't know about. See, authenticate and protect web and email traffic. Read this solution brief... see how to extend your security to the cloud with McAfee Cloud Security Platform.
  • Blueprint to Secure Cloud-Based Communications
    Source: McAfee
    White Paper: Secure cloud-based communications with a risk-based approach that helps businesses to safely use web and email channels, protect against data leakage and intellectual property loss, and reduce support and audit costs. Download the technology blueprint now.
  • 6 Steps to Defend Business-Critical Social Media
    Source: McAfee
    White Paper: 80 percent of organizations with over 1,000 employees allow access to social media sites. Yet the stakes of reputation loss and data loss are very high-averaging USD $2M per incident. Dive into 6 Best Practice considerations for safe & productive social media use. Get this solution guide now.
  • How to Stop Spear Phishing Attacks: Combating the Attack of Choice for Cybercriminals
    Source: FireEye
    White Paper: Learn how to prevent spear phishing--the latest and most dangerous technique in the cybercriminal's arsenal--from infiltrating your networks and compromising your customer data, intellectual property, and valuable trade secrets.

    This white paper from FireEye, written specifically for CISOs,
gipoco.com is neither affiliated with the authors of this page nor responsible for its contents. This is a safe-cache copy of the original web site.