ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security DevicesResearch

  • Network Project of the Year 2014

    Sponsored by: Talari Networks

    This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.

  • Navigating Today's DDoS Landscape

    Sponsored by: Ixia

    Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.

  • Next-Gen Security

    Sponsored by: Dell Software

    SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.

  • The Next Generation of Firewalls: How to Stop Tomorrow's Advanced Threats

    Sponsored by: Fortinet, Inc.

    This exclusive whitepaper discusses the next-generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.

  • Designing a Secure DNS Architecture

    Sponsored by: Infoblox

    This exclusive paper discusses how your organization can design a scalable and secure DNS architecture, examining what tools to use and what security threats you should be preparing for.

  • Extreme Networks Physical Security Solution

    Sponsored by: Extreme Networks

    This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.

  • Security Gateway Buyer's Guide

    Sponsored by: Intel

    If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention

    Sponsored by: Palo Alto Networks

    Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.

  • Information Security Magazine – July/August 2013

    Sponsored by: SearchSecurity.com

    This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.