Tap Aggregation and Filtering to Enable Deep Packet Inspection (DPI)
sponsored by Gigamon
WHITE PAPER:
Read this brief paper to learn how network monitoring using DPI analyzers is a mission critical application that is tailor-made for the Data Access Network (DAN) architecture and saves substantial amounts of money for the telecom carrier.
Posted: 01 Jul 2009 | Published: 01 Jul 2009
|
|
|
The Case for Application Security: How Real Is the Threat and What Are Your Options
sponsored by Fortify Software
WHITE PAPER:
This white paper examines the current hacking landscape and details what you can do to prevent a security breach within your organization. Read this white paper today and learn about the pros and cons of various application security solutions.
Posted: 24 Oct 2007 | Published: 24 Oct 2007
|
|
|
Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER:
This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008
|
|
|
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER:
The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
Posted: 26 Mar 2009 | Published: 01 Apr 2008
|
|
|
The Value of Integrated Security
sponsored by Cisco Systems, Inc.
WHITE PAPER:
Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.
Posted: 09 Jun 2009 | Published: 07 Nov 2008
|
|
|
Networking Basics: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER:
When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more.
Posted: 10 Oct 2008 | Published: 10 Oct 2008
|
|
|
Move Web Application Security Testing into Your Development Cycle
sponsored by IBM
WHITE PAPER:
This paper focuses on the role developers can play in solving Web application security issues, and it details how IBM Rational® AppScan® Developer Edition software can enable them to do so.
Posted: 06 Oct 2008 | Published: 04 Oct 2008
|
|
|
10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER:
Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006
|
|
|
Blackberry Enterprise Solution: Security Technical Overview
sponsored by BlackBerry
WHITE PAPER:
This document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
Posted: 09 Dec 2008 | Published: 09 Dec 2008
|
|
|
Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
sponsored by Symantec Corporation
WHITE PAPER:
Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Posted: 02 Oct 2008 | Published: 02 Oct 2008
|
|