Corporate Partners

Security Whitepapers


Sort by: Date | Company | Title


Getting Started With a Zero Trust Approach to Network Security
By Palo Alto Networks | 16/7/2014
Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate network. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust architecture.
Download this now


Cybersecurity Imperatives: Reinvent your Network Security
By Palo Alto Networks | 16/7/2014
Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.
Download this now


10 Things Your Next Firewall Must Do
By Palo Alto Networks | 16/7/2014
For enterprises looking at Next-Generation Firewall’s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.
Download this now


Security and Speed
By F5 Networks | 16/7/2014
Security is an intrusive mechanism that is often seen to interfere with normal business operations. Nonetheless, security is essential to the normal operation of the business, and the right security mechanisms and approaches can minimize performance degradation.
Download this now


Key Communications Systems Are Always Available, Highly Responsive for Global Mining Company
By F5 Networks | 16/7/2014
Mining company Teck Resources wanted to ensure high availability and responsiveness for its critical employee communications systems. To achieve this goal, Teck chose a comprehensive F5 traffic management and secure access solution that provides high availability and give users a more responsive experience.
Download this now


Protecting Against Application DDoS Attacks : A Three-Step Solution
By F5 Networks | 16/7/2014
Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.
Download this now


DDoS Protection: Recommended Practices
By F5 Networks | 16/7/2014
A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defense—preparing your network applications during “peacetime” will go a long way to helping you mitigate the attack in the future.
Download this now


F5 data center firewall aces performance test
By F5 Networks | 16/7/2014
"The F5 firewall came up aces, maxing out network capacity while also offering sophisticated filtering and attack protection capabilities" slide. Read this network World performance test
Download this now


Rackspace Hosting Links Dedicated Servers to Cloud for Maximum Scalability and Flexibility
By F5 Networks | 16/7/2014
Rackspace Hosting, the world’s leading specialist in hosting and cloud computing, wanted to offer its customers an easy way to link dedicated managed servers to cloudbased servers. The company used Application Delivery Networking devices from F5 to help build a hybrid service called RackConnect.
Download this now


Intelligent Traffic Management
By F5 Networks | 16/7/2014
Communications service providers (CSPs) are struggling with an explosion of data traffic resulting from increased mobile usage, streaming video, resource-intensive over-thetop (OTT) applications, and smart device proliferation. At the same time, CSPs must deploy new network technologies and services to stay competitive and satisfy customers.
Download this now

Editor's Recommendations

Solution Centres

Events

View all events Submit your own security event

Blog Posts

Media Release

More media release

Market Place