ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Gunner Peterson's Security Gateway Buyer’s Guide

    Sponsored by: Intel

    Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • Best practices for implementing 2048-bit SSL

    Sponsored by: Citrix

    Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.

  • 6 Crucial Incident Response Policy Mistakes to Avoid

    Sponsored by: Delta Risk

    Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.

  • From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts

    Sponsored by: HP Inc

    In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.

  • IBM Collaboration Software for the Apple iPhone and iPad Devices

    Sponsored by: IBM

    Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.

  • 5 Steps to Network Situational Awareness

    Sponsored by: Lumeta Corporation

    This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.

  • Unified Threat Management Guide

    Sponsored by: Sophos

    This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • Maintaining network infrastructure in a pandemic and beyond

    Sponsored by: TechTarget Networking

    As workers join video conferences and access corporate resources remotely, they're likely unaware of the network infrastructure that supports those actions -- until something doesn't work. In this e-guide, learn how to prepare your network for an increased number of remote workers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.