ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security DevicesResearch

  • Achieve Network Visibility and Control with Firewall Traffic Classification

    Sponsored by: Palo Alto Networks

    In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies.

  • Evaluating Cost Of A DDoS Attack

    Sponsored by: Dyn

    This brief whitepaper evaluates the costs of DDoS attacks and explores what current organizations are doing to prevent them.

  • Protecting DNS Infrastructure - Inside and Out

    Sponsored by: Infoblox

    This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.

  • Firewalls and IPS: Deploying Web Security

    Sponsored by: Cisco Systems, Inc.

    This informative resource takes an in-depth look at internet edge firewall and intrusion prevention system (IPS) security services that protect your organization's gateway to the internet, providing helpful tips and guidance for ensuring your web presence is safe and secure.

  • SC Magazine Security Brief: Server Side Risk

    Sponsored by: Lumension

    This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks.

  • Designing a Secure DNS Architecture

    Sponsored by: Infoblox

    This exclusive paper discusses how your organization can design a scalable and secure DNS architecture, examining what tools to use and what security threats you should be preparing for.

  • Demystifying Switch-based ACLs

    Sponsored by: Global Knowledge

    This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more!

  • IT Priorities 2014: UK Europe, France and Germany

    Sponsored by: ComputerWeekly.com

    Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.

  • The Next Generation of Firewalls: How to Stop Tomorrow's Advanced Threats

    Sponsored by: Fortinet, Inc.

    This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.

  • IBM Collaboration Software for the Apple iPhone and iPad Devices

    Sponsored by: IBM

    Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.