ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Monitoring Research

  • Competitive Landscape: Carrier-Class Network Firewalls

    Sponsored by: Juniper Networks, Inc.

    As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.

  • Deliver Security Virtually Everywhere with SDN and NFV

    Sponsored by: Juniper Networks, Inc.

    Security vendors are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.

  • Networking: You Can't Protect What You Can't See

    Sponsored by: Cisco Systems, Inc.

    Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.

  • Incident Response with NetFlow for Dummies

    Sponsored by: Cisco Systems, Inc.

    Security incidents are critical times for information security pros, with the time period after the first identifications having a big impact on the incident's severity. Access this e-book to learn how to align your incident response processes with industry-standard practices and how to enhance your technical capabilities.

  • A New Approach to Data Center Security

    Sponsored by: VMware

    The persistent threats and coordinated attacks in today's environment call for a new model of data center security. But how do you implement this new model without incurring huge hardware and firewall costs? Access this white paper to learn how micro-segmentation empowered by a network virtualization platform delivers fine-grained security.

  • NYU Shanghai Delivers a Higher Degree of Network Performance

    Sponsored by: CommScope

    In this case study, you'll learn how NYU Shanghai was able to improve networking, support voice-over-IP calls, remote VPN, and more with their newly designed data center. Discover ways their strategy could benefit you.

  • Hiding in Plain Sight: Komodo Eye Spots Wireless Network Issues

    Sponsored by: eTECH Channel

    Learn about how an enterprise offering outsourced IT services deployed a network monitoring tool to its clients. Specifically, businesses that are using wireless as their chief network connection, or are struggling with their wireless networks.

  • Improving Video Call Quality: 2016 Survey Results and Expert Advice

    Sponsored by: Vyopta

    Discover what enterprises are saying about their current video call quality, where they feel it is lacking, and what can be done to fortify this essential tool for collaboration going forward.

  • See Why Network Monitoring Tools are Critical in today's Hyperconnected World

    Sponsored by: eTECH Channel

    This e-guide helps you determine how to best implement your NPM on day one. You'll learn why these performance-oriented network monitoring systems bear watching and how to resolve downtime issues.

  • PSA Buyer's Guide

    Sponsored by: Autotask Corporation

    In this buyer's guide you'll discover a step-by-step process for technology service providers to compete in one of the fastest and most disruptive business environments in the industry.

  • Improve Remote Monitoring and Management

    Sponsored by: Autotask Corporation

    Discover 5 business advantages that can be obtained when addressing a solution towards remote monitoring and management (RMM) including policy-based management and support, superior cloud-based services, and more.

  • 5 Steps to Pricing Managed Services

    Sponsored by: Autotask Corporation

    Harness a customizable framework for ITSPs pricing for predictable revenue streams, more efficient resource allocation, and the ability to quickly scale to add new clients and manage more devices without adding resources.

  • Building a Profitable Hybrid IT Service Catalog

    Sponsored by: Autotask Corporation

    ITSPs and MSPs are increasingly turning to hybrid IT services offerings in order to gain more sales and customers. Access this guide now to learn how to get started building your service catalog, and how to do it effectively in order to gain and retain clients.

  • Metrics That Matter 2016

    Sponsored by: Autotask Corporation

    As your needs are changing in cloud environments, are ITSPs providing enough options for endpoint management and security? This report highlights how IT service providers can help manage increasingly extended networks of communication and drive value around the growing use of devices.

  • Strengthening Cybersecurity at the Tour de France

    Sponsored by: Dimension Data

    Discover how Tour de France revolutionized their viewing experience, demonstrating their continued proactive stance on cybersecurity. Learn how they successfully thwarted 1,716 deliberate cyberattacks on their network's perimeter.

  • The Pros and Cons of Microsegmentation for your Virtualized Environments

    Sponsored by: NTT Com Security (UK) Ltd

    Microsegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.

  • Big Tap Monitoring Fabric: Tap Sharing

    Sponsored by: Big Switch Networks

    With the advent of SDN on Bare Metal Ethernet Switches, making the jump to third-generation, multitenant monitoring fabric for tap sharing is an increasingly attractive option from a CapEx, OpEx and design transition perspective. Read this white paper that explains how making the jump to SDN can absolve your networking issues.

  • Automated Infrastructure Management Delivers Real-Time Network Visibility

    Sponsored by: CommScope

    Explore how to gain real-time, granular visibility into the critical connectivity that drives your business with automated network infrastructure management (AIM).

  • Overcoming the Video Conferencing Adoption Void

    Sponsored by: Vyopta

    Learn the results of a survey which discovered that many enterprises are experiencing disconnects in their video conferencing policies.

  • Laptop Management for Windows

    Sponsored by: IBM MaaS360

    Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.

  • Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks

    Sponsored by: Citrix

    Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.

  • A Security Delivery Platform Benefits the Entire Organization

    Sponsored by: Gigamon

    As the cybersecurity threat landscape continues to evolve, organizations need to start taking into account current and future cybersecurity trends. Examine a solution that provides the network visibility you need to improve protection.

  • Make Behavioral Analytics Part of Your Security Strategy

    Sponsored by: MASERGY

    Discover how behavioral analysis work and learn how it can benefit your network security. Shift your focus from blocking and preventing breaches to detecting and rapidly responding to attacks.

  • The Network Takes Center Stage

    Sponsored by: IBM

    Pinpointing issues is becoming more challenging as networks expand and become more complex, but there are ways to monitor your network more effectively in order to spot the early warning signs of downtime. Access this special report to learn about analytics technology, outsourcing options, and more.

  • QRadar SIEM

    Sponsored by: IBM

    Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.