ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • A Powerful Defense Against Denial of Service Attacks

    Sponsored by: Citrix

    This white paper examines the modern DoS landscape, and provides several solutions in dealing with current DoS threats, given their fast-growing numbers.

  • The Real Costs of a DNS Outage

    Sponsored by: Nominum, Inc.

    This paper details the costs that were incurred by a global broadband provider after a DoS attack compromised their DNS. Access now and learn about the harsh realities of an ill-prepared infrastructure that couldn't cope with services outages. Read on to learn how you can prepare your own business to avoid a similar fate.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • Top 5 DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • Insights and Recommendations for Top Security Concerns; Annual Security Report

    Sponsored by: Cisco Systems, Inc.

    This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.

  • Securing Today’s Mobile Workforce

    Sponsored by: Juniper Networks, Inc.

    BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

  • The Fight for Full Network Visibility in a Dangerous World

    Sponsored by: APCON, Inc.

    This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.

  • Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation

    Sponsored by: Intel

    This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: Dell, Inc.

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Navigating Today's DDoS Landscape

    Sponsored by: Ixia

    Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.