Research Library

Powered by

Network Monitoring Research

  • Network Virtualization and Software-Defined Networking: Which one is Right for You?

    Sponsored by: VMware

    If you've been researching how to make changes in your network, you may have considered software-defined networking (SDN) and network virtualization. Learn which one allows you to control switches and routers through software, and which one allows you to run the entire network in software.

  • Are Your Printers Vulnerable to Attack?

    Sponsored by: HP

    This web page features a questionnaire that will let you know if your networked printers are currently vulnerable to attack. Also, you will learn about printer security focus areas and a tool that reveals the range of printer security options now available.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • Endpoint Monitoring and Forensics

    Sponsored by: LogRhythm, Inc.

    Defending against advanced threats, compliance violations, and operational issues is an ongoing battle. A key part of winning the fight is your ability to correlate what's happening at the endpoint level to event data throughout the network. Find out how to unlock visibility and protection with fully integrated endpoint monitoring and forensics.

  • Securing the Borderless Enterprise

    Sponsored by: Fortinet, Inc.

    This enterprise firewall checklist provides you with a view of where your expected enterprise firewall capabilities stand when put into comparison against those of your peers and in the process, help identify the gaps. Download now and uncover the insight you need to deploy the best fit enterprise firewall for your business.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.


    Sponsored by: Symantec

    Discover what can be done to steel a website to malware and data breach attacks with comprehensive website security. Also uncover a breakdown of notable security events in 2015, and analyze key takeaways from real attacks on systems just like yours.

  • Gain Network Visibility Or Fall Behind

    Sponsored by: Catchpoint Systems Inc.

    This data sheet introduces a product that allows you to monitor all network components critical to service delivery, from your websites and apps to the DNS infrastructure and cloud – and beyond.

  • The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

    Sponsored by: Palo Alto Networks

    This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.

  • The Top 3 Monitoring Challenges IT Faces

    Sponsored by: AppNeta

    IT's visibility into applications both in-house and in the cloud is more important and more difficult than ever. Discover the top 3 monitoring challenges facing IT teams today and how to overcome them.

  • Measuring Web App Performance Into and Across Cloud Providers

    Sponsored by: AppNeta

    End user experience is what drives business. To ensure the best possible experience, IT teams need the ability to monitor off-premise apps and services. This webcast teaches you which metrics require attention in measuring app performance, why slow response times are as problematic as downtime, and more.

  • The Case for Business-critical SaaS Application Monitoring

    Sponsored by: AppNeta

    This case study details how National Instruments was able to overcome their application performance issues by implementing an application performance management platform that provided end-to-end path and user experience monitoring specifically designed for their applications.

  • The Packet Train Difference

    Sponsored by: AppNeta

    Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.

  • A New Approach to Network Monitoring

    Sponsored by: AppNeta

    End-user application experience monitoring has become more difficult due to cloud computing. This white paper details the challenges presented by cloud applications and an entirely new way to assess, monitor, troubleshoot and report on network performance from the perspective of applications that run on the network.

  • Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring

    Sponsored by: AppNeta

    "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.

  • Network Management and Operational Efficiency Are Vital to Security

    Sponsored by: Forcepoint

    Learn how to make a NGFW work for your enterprise, both in the sense of security and the bottom line. Discover the intricacies of these firewalls, and what your enterprise might or might not need to manage one towards its potential.

  • Case study: Next Generation Firewall Protection

    Sponsored by: Forcepoint

    Learn what NETprotocol did to ensure that it provided the most resilient, scalable network security solution on the market. Discover how it helped its clients maximize efficiency and improve ROI from their IT budgets responded to the exact needs of each client, and more.

  • Case study: Strengthening Front-end Security

    Sponsored by: Forcepoint

    Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.

  • Cisco Nexus Data Broker

    Sponsored by: Cisco Systems, Inc.

    Network traffic monitoring has become more challenging as network and application traffic volume has increased, requiring the move to monitoring domains for better visibility. Access this resource to learn how to monitor any part of your network in an automated and cost-effective way.

  • Advanced Evasion Techniques for Dummies

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • Why Now Is the Time to Re-Architect the Enterprise Network

    Sponsored by: Juniper Networks, Inc.

    IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.

  • Deciphering the Tactics of the Enemy: APT-Style Attacks

    Sponsored by: Dimension Data

    In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.

  • 7 Critical Components for Cybersecurity Readiness

    Sponsored by: Dimension Data

    This guide shows you seven elements of cyber security readiness critical for every organization. Expert Peter Sullivan outlines the most important components that your organization needs for a high degree of situational awareness into your network operations and utilization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.