Network Behavior Anomaly Detection Reports

Network Forensics in a 10G World
sponsored by WildPackets, Inc.
WHITE PAPER: This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

WildPackets, Inc.

High Performance, High Capacity 2048/4096-bit SSL Offload
sponsored by A10 Networks
WHITE PAPER: This informative white paper explains the need for secure socket layer (SSL) offloading in order to reduce added pressure on central processing units (CPUs) from 4096-bit keys.
Posted: 24 Sep 2013 | Published: 28 Feb 2013

A10 Networks

Cisco® ONE: Traffic Visualization and Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource explores how Cisco ONE's traffic visualization and control capability can help service providers visualize traffic end-to-end across the network and respond to unpredictable network capacity demands quickly, easily, and efficiently.
Posted: 26 Jun 2013 | Published: 30 Apr 2013

Cisco Systems, Inc.

Simplify Network Monitoring with Ixia Anue NTO
sponsored by Ixia
VIDEO: Are you ready to make network monitoring simple and secure again? View this video to learn about a solution that can help you achieve just that.
Posted: 03 Sep 2013 | Premiered: 03 Sep 2013

Ixia

TechGuide: Applying Virtualization Networking in the Cloud
sponsored by DellEMC and Intel®
EGUIDE: This Tech Guide from SearchNetworking.com explores emerging network virtualization protocols and strategies, and uncovers the need for software-defined networking in cloud environments.
Posted: 28 Mar 2012 | Published: 28 Mar 2012

DellEMC and Intel®

New Virtual Networking Technologies Make Convergence Real
sponsored by TechTarget Security
EGUIDE: This expert e-guide discusses what role the cloud plays in the convergence of IT. Uncover 3 important lessons the cloud provides on converged infrastructure solutions, 3 main approaches to creating virtual networks and more.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

TechTarget Security

How to Manage the Virtual, Automated Environment
sponsored by TechTarget Security
EGUIDE: SearchNetworking.com’s E-Guide on the new era of network management explores the challenges involved with cloud computing and virtualization and how to prevent and control VM sprawl.
Posted: 07 May 2012 | Published: 07 May 2012

TechTarget Security

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: In this informative white paper, uncover a unified visibility fabric architecture that centralizes network monitoring and management tools for improved and simplified performance and security analysis.
Posted: 24 Sep 2013 | Published: 30 Aug 2013

Gigamon

SDN use beyond the data centre
sponsored by Hewlett-Packard Enterprise
ANALYST REPORT: This analyst report covers 5 different examples of companies that have experienced many positive results after adopting software-defined networks (SDN), beyond the enterprise data centre.
Posted: 26 Sep 2013 | Published: 10 Jul 2013

Hewlett-Packard Enterprise