White Papers by Topic: Security

Resources available: 327

Securing the Small Business Network

This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

Achieve Deeper Network Security and Application Control

Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security.

Why Threat Intelligence is Critical for Next Generation Firewalls

A top-tier threat intelligence network is the foundation of an effective next-generation firewall. This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed.

Real-world Identity and Access Management for Unix Systems

Unix systems face special IAM challenges. Discover how to be overcome them with the right practices and tools, enabling you to enhance security, achieve compliance and dramatically improve operational efficiency.

eBook: IAM for the Real World: Privileged Account Management

Read this e-book for essential information on the common security issues with privileged account management - and how you can minimize or eliminate them.

Controlling & Managing Super User Access

Every business needs privileged account users. Unfortunately, most operating systems offer all-or-nothing solutions. This white paper explores the risks associated with privileged accounts, and explains how Dell solutions can mitigate those risks.

The Importance of Managing Privileged Accounts

Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better?

Secure the Use of Portable Media in Critical Infrastructure

Securing critical infrastructure is crucial to ensuring that our current way of life is sustained.

3 Questions to Ask Your DNS Host about Lowering DDoS Risks

Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.

The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers

©1994-2014 Infoworld, Inc.