ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • How to best secure DNS? There's more than one approach

    Sponsored by: TechTarget Security

    The passive DNS approach may be the way to secure DNS in the enterprise. The method employs networks of sensors to monitor the DNS ecosystem for suspicious domain name activity and stop it cold. Learn how passive DNS works in the endless cat-and-mouse IT security game.

  • How SD-WAN is Changing Network Security

    Sponsored by: Cato Networks

    In this expert e-guide, we explore how network security has to change in order to keep up with the evolution of SD-WAN. Find out how some vendors are differentiating their SD-WAN platforms with native security, and read up on how SD-WAN is reshaping the network connectivity landscape.

  • Effective end-user management helps fuel productivity

    Sponsored by: TechTarget Enterprise Desktop

    Download this three-part handbook on end user management to take a look at the double-edged nature of many technologies aimed to improve productivity, the potential of companion apps and more.

  • How to Make the Most of your Detection and Response

    Sponsored by: Respond Software

    Learn from Gartner analyst Anton Chuvakin and Drew Conry-Murray from Packet Pushers, about incident detection and response processes that an organization needs when starting out.

  • The Evolution of ADC

    Sponsored by: Citrix

    Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: TechTarget Security

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

  • What SD-WAN Means for Today's Businesses

    Sponsored by: Verizon

    Learn from Lee Doyle, Principal Analyst at Doyle Research, about how a mature SD-WAN market can bring distributed networks up to speed with simplicity and automation. Then, find out how to exactly tailor SD-WAN for your business needs.

  • Network Evolution: Network Pros Get Smart(er) with Analytics

    Sponsored by: TechTarget Networking

    In this issue of Network Evolution e-zine, learn why enterprises are turning to big data network analytics tools that leverage machine learning and AI to create meaningful, actionable information that can help enhance network performance.

  • Optimizing Endpoint Security for the Enterprise

    Sponsored by: ConvergeOne

    Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.

  • The New Age of Microsegmentation

    Sponsored by: Illumio

    Why has a microsegmentation security strategy become so popular? In this e-guide, experts Andrew Froehlich and Dave Shackleford discuss the benefits and drawbacks of microsegmentation and how to get the most of your security approach.

  • Endpoint Protection & Device Management

    Sponsored by: Seqrite

    The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.

  • How to Successfully Move your UCC Strategy to the Cloud

    Sponsored by: Cisco

    This e-guide explores unified communication and collaboration (UCC) challenges IT networking pros need to overcome, as well as how to craft cloud UC strategies to aid in overcoming these challenges.

  • Defense-In-Depth Security: Key to Keeping IT Safe

    Sponsored by: TechTarget Security

    The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.

  • How SMBs are Changing their Security Tactics

    Sponsored by: Booz Allen Hamilton

    Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.

  • How SD-WAN Can Benefit Branch Networks

    Sponsored by: Hughes Network Systems

    Gain valuable insights into why organizations are rapidly adopting cloud-based software networking technologies like SD-WAN to meet these next-generation WAN requirements. Then, uncover how you can bring distributed networks up to speed with simplicity and automation.

  • Plug Into the Network of the Future: Hyper-converged Infrastructure, SD-WAN, and Intent-based Networking

    Sponsored by: TechTarget Networking

    Hyper-converged infrastructure, SD-WAN, and intent-based networking: How all of these combine to create the future of networking technology remains to be seen. In the meantime, network managers continue to find the best ways to manage their expanding networks. Learn more in this issue of Network Evolution e-zine.

  • Buyer's Guide: Cybersecurity

    Sponsored by: Palo Alto Networks

    Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.

  • Firewall Buyer's Guide

    Sponsored by: Palo Alto Networks

    Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.

  • Buyers Guide: Network Security Management

    Sponsored by: Palo Alto Networks

    When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.

  • A New Call for Alignment Between Business Needs and Enterprise Networks

    Sponsored by: TechTarget Networking

    In this issue of Network Evolution e-zine, we learn how more comprehensive IT-business strategic alignment would aid network managers. We focus on 3 key areas: hardware management, UC, and network security.

  • SIEM Analyst Research Bundle

    Sponsored by: AT&T Cybersecurity

    No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.

  • New Options to Enable Remote Access in the Network

    Sponsored by: TechTarget Networking

    This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.

  • Guide to Early Application Testing and Understanding Dev and Ops Responsibilities

    Sponsored by: IBM

    Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.

  • How to Think like a Hacker to Stop Application Security Threats

    Sponsored by: IBM

    Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.

  • How to Secure Mobile Applications in a Private Cloud

    Sponsored by: IBM

    In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.