Network Perimeter Security White Papers

(View All Report Types)
Seagate NAS - What's Driving Data Security and Remote Access Inside
sponsored by Seagate Technology
WHITE PAPER: Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network.
Posted: 18 Feb 2014 | Published: 18 Feb 2014

Seagate Technology

Buyer's Criteria for Advanced Malware Protection
sponsored by Sourcefire
WHITE PAPER: This guide explores the current state of malware in today's threat landscape and discusses some of the top strategies for stopping sophisticated malware.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Sourcefire

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise

Breaking the Cyber Attack Lifecycle
sponsored by Palo Alto Networks
WHITE PAPER: This white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
Posted: 10 Dec 2015 | Published: 31 Mar 2015

Palo Alto Networks

Defending Against Application-Layer DDoS Attacks
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper explains the serious problem that DDoS threats present, and how it impacts your business.
Posted: 25 Jun 2014 | Published: 31 Dec 2013

Juniper Networks, Inc.

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Building a Better Network Security Strategy
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise