Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers' greatest...

    Sponsored By IBM

  • White Papers // Feb 2014

    EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager

    This EMA report explores the values of the newest product of the QRadar platform, IBM Security QRadar Vulnerability Manager, the need for better integrated security architecture expressed by enterprises worldwide, and example use cases that highlight the value of the IBM approach. Download this analyst report to discover how...

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Delivering Success that Scales with the Largest Enterprises

    IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and...

    Sponsored By IBM

  • White Papers // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data...

    Sponsored By IBM

  • White Papers // May 2014

    What's Behind a Cyberattack?

    IBM Security QRadar Incident Forensics provides a next-generation approach to security incident forensics that supports network security, insider threat analysis - including fraud and abuse - and the documentation of incident-related evidence.

    Sponsored By IBM

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Mar 2014

    Managing Security Risks and Vulnerabilities

    With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

    Sponsored By IBM

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Feb 2014

    Leverage Security Intelligence to Protect Sensitive Healthcare Data

    IBM solutions deliver the end-to-end systems visibility necessary to give healthcare organizations the true security intelligence they need - with the ease of use and labor-saving automation that makes security intelligence a powerful and achievable tool for protecting information.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Aug 2014

    Select the Right Solution for Identity and Access Assurance 

    This buyer’s guide can help you select the right identity and access management solution to successfully manage and control user access within, across and between organizations. The guide outlines the most common identity and access management challenges organizations face from the perspective of CSOs, IT operations staff, line-of-business managers and...

    Sponsored By IBM

  • White Papers // May 2014

    IDC Product Flash: IBM Releases Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security

    Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions.

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to...

    Sponsored By IBM

  • White Papers // Apr 2014

    Protect the Mobile Enterprise with Smarter Security

    Provide secure access for mobile users, block unauthorized users and prevent fraud with IBM Security Access Manager for Mobile

    Sponsored By IBM

  • White Papers // Mar 2014

    When Millions Need Access: Identity Management in an Interconnected World

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Jul 2014

    Introducing Social Business for the Mid-Market.

    Aberdeen has studied the business practices of 229 mid-sized companies surveyed for the 2011 Aberdeen Business Review and 61 mid-sized companies profiled in Aberdeen's 2011 Social Collaboration Research. Mid-market organization can achieve strategic benefits from optimizing their Social Business deployments and achieving Best-in-Class status. This report provides directional guidance for...

    Sponsored By IBM

  • White Papers // Oct 2014

    The Power of Enterprise PaaS - infographic

    Why is the enterprise platform-as-a-service (PaaS) market the focus of so much attention? Enterprise PaaS makes it faster and easier to build, test, deploy and scale applications across private or public cloud infrastructure. PaaS decreases time to market for applications and increases developer productivity. Download this resource now and...

    Sponsored By Pivotal

  • White Papers // Oct 2014

    PaaS: Open for Business

    Companies looking to drive innovation through software development have new options and opportunities. Agile development practices speed time to market with continuous delivery of new applications and features. Advances in cloud computing and virtualization allow organizations to streamline (or eliminate altogether) the provisioning of infrastructure. Download this whitepaper and learn...

    Sponsored By Pivotal

  • White Papers // Aug 2014

    Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Aug 2014

    Buyer's Guide: Identity and Access Management

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Aug 2014

    Enterprise Security in Transition - An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection - Integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Aug 2014

    Identity Management in an interconnected world: When Millions need access

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Aug 2014

    Today's Biggest IT Risks : Defending Against Malware -A Holistic Approach

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection. Download this...

    Sponsored By IBM

  • White Papers // Aug 2014

    Enterprise Security: Avoiding Insider Threats

    IBM Security Privileged Identity Manager helps organizations to securely manage and track the activities of privileged users, thereby reducing the risk of breaches, improving compliance and ensuring accountability. The IBM white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling...

    Sponsored By IBM

  • Webcasts // Oct 2014

    Live Webcast: 5 Power Skills to Boost Your Personal Influence

    Join us for this LIVE event! Tuesday, October 28, 2014 10 AM (PDT) / 1 PM (EDT) How much influence do you have in your organization? Wish you had more? Leaders need to be able to gain support for their ideas and to push them through their organizations. And...

    Sponsored By Citrix Online

  • Research // Sep 2014

    IT Service Provider Breaks Into Storage Services With Disaster Recovery as a Service for Hitachi Content Platform Owners

    In this fast-changing technology landscape, are you looking for cost-effective ways to expand the services your enterprise offers while retaining your share of the market? At first glance, branching out into cloud storage services might appear to be a risky proposition, considering the formidable competitors who occupy that space....

    Sponsored By Hitachi

  • White Papers // Sep 2014

    Checklist for Cloud Mobility Readiness

    Are you trying to determine the readiness of your enterprise’s content mobility solution? Today’s mobile worker want real-time, remote and secure access to your enterprise’s fast-growing information. To ensure the right data is in the right place at the right time, your organization needs a solution that provides your workforce...

    Sponsored By Hitachi

  • White Papers // Sep 2014

    Workforce Mobility Comparison Guide

    Are you challenged to find a mobile solution that enables employees to safely create and share content without compromising your enterprise’s security? With the rise of BYOD in the workplace, IT decision makers are faced with finding ways to securely deliver file synchronizations capabilities. The limitations of traditional file...

    Sponsored By Hitachi

  • Research // Sep 2014

    Fixing the Disconnect Between Employer and Employee for BYOD

    The corporate workplace is changing. As employees increasingly use their own phones/tablets/laptops for work, corporate networks will be increasingly vulnerable to sophisticated viruses and malware - unless these devices are reined in with a BYOD enterprise program. Employees and employers often have vastly different attitudes regarding BYOD programs. To better...

    Sponsored By Webroot

  • White Papers // Sep 2014

    Performance Benchmark Report 2014

    PassMark Software® conducted objective performance testing on 8 security software products using 13 performance metrics. Find out how Webroot’s SecureAnywhere Business Endpoint Protection product performs against 7 competitor products. Download this research to learn more.

    Sponsored By Webroot

  • White Papers // Sep 2014

    ThreatBrief - CryptoLocker Your Money or Your Life

    Cryptolocker is a nasty bit of ransomware that encrypts all your files and holds them hostage . It’s been wreaking havoc worldwide since September 2013 – but we see a new variant every few weeks. Find out how Webroot SecureAnywhere solutions uses cloud-based behavioral intelligence to discover new malware and...

    Sponsored By Webroot

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Business Insight: Enabling User Mobility with Enterprise Security Solutions

    Learn how to enable user mobility without compromising security. Savvy organizations have embraced the benefits of user mobility, including increased productivity, improved customer relationships and lower costs. See how to keep your data and resources secure.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone and iPod Touch Users

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

    Sponsored By Dell Software