ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Best practices for implementing 2048-bit SSL

    Sponsored by: Citrix

    Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.

  • 4 Questions to Ask When Evaluating Network Security Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.

  • Securing Today’s Mobile Workforce

    Sponsored by: Juniper Networks, Inc.

    BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

  • The Self-Defending Network

    Sponsored by: Cisco Systems, Inc.

    Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.

  • Information Security Magazine – July/August 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • Top 5 DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • 5 Steps to Network Situational Awareness

    Sponsored by: Lumeta Corporation

    This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.

  • Cisco Smart Business Architecture

    Sponsored by: Cisco

    This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.

  • Top Five DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.