ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security DevicesResearch

  • SearchSecurity.com University: Network Security

    Sponsored by: SearchSecurity.com

    This classroom provides tactics for validating the performance and effectiveness of key network security technologies and strategies for ensuring they work together to provide pervasive protection.

  • Purchase Intentions – Summer 2013 Europe

    Sponsored by: TechTarget

    Making the right purchasing decisions is a daunting task, especially when it concerns the well-being of your organizations network. By taking this brief survey you will gain access to this exclusive guide based off a survey completed by over 600 respondents on purchase intentions. Learn what drives purchases, what is being purchased, and much more!

  • Intervention areas for superfast broadband project Connecting Cumbria

    Sponsored by: ComputerWeekly.com

    UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria

  • Next-Gen Security

    Sponsored by: Dell Software

    Find out how SSL decryption and inspection can keep attackers away from your data and out of your network. Given that SSL threats are likely to increase, it's more important than ever for businesses to consider purchasing next-generation firewalls.

  • Network Purchasing Intentions 2012

    Sponsored by: ComputerWeekly.com

    This in-depth research from Computer Weekly and Tech-Target, reveals the IT networking trends and spending priorities for European IT professionals in 2012.

  • Protecting DNS Infrastructure - Inside and Out

    Sponsored by: Infoblox

    This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.

  • Reassessing DDoS - Lessons Learned

    Sponsored by: Neustar®

    This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into.

  • PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall

    Sponsored by: Riverbed Technology, Inc.

    PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.

  • Unified Threat Management Guide

    Sponsored by: Sophos, Inc.

    This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.

  • InterMapper Network Monitoring Keeps Detroit Radio Stations on the Air

    Sponsored by: InterMapper

    When Greater Media Detroit’s three radio stations encountered several hard to find and difficult to understand network problems, they turned to InterMapper to track the issues down. Read their story here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.