ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Cisco

  • The Role of AIOps in Network Infrastructure Operations

    Download this ESG e-book for a close look at the challenges associated with a highly distributed network environment, and the benefits achieved by organizations at varying stages of AI adoption and maturity.

  • Cisco AI Readiness Index

    Download this e-book, the Cisco AI Readiness Index, to investigate how you can evaluate your organization’s AI potential by examining the 6 key pillars of AI readiness.

  • Cisco DUO: The State of Passwordless in the Enterprise - ESG Survey Findings

    76% of organizations experienced multiple account or credential compromises over the past 12 months. Join this discussion with Cisco Duo Product Marketer Matt Brooks and ESG Senior Analyst Jack Poller as they unpack the research findings to understand the evolution of multi-factor authentication and passwordless technologies.

  • Marriott Leads the Hospitality Industry in the Fight Against Online Child Exploitation

    Seeing value in Cisco Umbrella’s cloud-delivered DNS-layer security during a pilot, Marriott rapidly deployed Umbrella to nearly 5,000 properties throughout U.S. and Canada. Discover how Cisco has helped Marriott to take a stand against illegal online activity and to provide its guests with safer Wi-Fi connections.

  • Security Outcomes for Zero Trust

    Zero-trust security strategy should be securing access in a way that frustrates attackers and not users. Zero trust is not a new concept. But today’s rise in adoption reflects a fast-changing reality - boundaries that once existed to secure access to corporate data no longer exist. Learn about some secrets to success in this Cisco white paper.

  • Qdoba Cisco Testimonial

    Qdoba Mexican Eats is connected and protected by Cisco Secure. Hear Gary Burgess, Director of Infrastructure and Security at Qdoba, discuss how a SASE solution that combines Cisco Umbrella cloud-delivered security and Meraki’s cloud-managed networking keeps connectivity reliable and secure.

  • Phishing Cisco Special Edition

    Protecting yourself and your business from phishing attacks can be a daunting task. While it's impossible to eliminate all risk, there are steps you can take to reduce the odds and your brand. Enter "Phishing for Dummies" – the definitive guide for IT professionals seeking comprehensive knowledge and defense against phishing attacks.

  • U.S. FTC Safeguards Rule

    The Safeguards Rule requires mitigation of “reasonably foreseeable internal and external risks” - in other words, protection against data breaches, data leakage, phishing, and ransomware. Learn how Cisco Umbrella supports compliance in this white paper.

  • Market Guide for Single-Vendor SASE

    This Gartner research will help guide infrastructure and operations leaders to understand the emerging single-vendor SASE landscape.

  • Cisco Umbrella for Government Whitepaper

    Government agencies have many factors to consider when acquiring and building security solutions. In this white paper, discover how Cisco Umbrella can provide a secure foundation for agencies who are navigating a rapidly changing reality when it comes to where their workers are located and where their mission-critical applications are hosted.

  • How to go from MFA to zero trust

    Discover a five-phase approach for implementing zero trust security for trusted access to applications.

  • Securing the Emerging Hybrid Workforce

    As the corporate world enters a hybrid era, companies must adapt to protect their digital assets and people. PeerSpot members are putting the Cisco Secure Hybrid Work solution to work in use cases that seek to realize these protective goals.

  • PeerStory: Duo Security

    As hybrid work solidifies itself in today’s business landscape and sophisticated threats hound users hoping to gain entry, organizations are looking for robust access management solutions to lock down their environments. Read the PeerSpot PeerStudy and learn how you too can harness stronger security that’s user-friendly and cost-effective.

  • MHC Healthcare Customer Case Study Video

    With over 700 employees and 55,000 patients, MHC Healthcare needed strong security that was also easy to use. With Cisco providing seamless protection across users and devices, MHC can focus on what matters most – providing the highest level of care for those who need it most.

  • Duo Trusted Endpoints

    Explore the full potential of device trust with Duo Trusted Endpoints. Strengthen your defense against unauthorized access to your digital assets.

  • Duo Makes Strong Security Feel Easy

    At a glance, discover how Cisco Duo combines robust authentication with a user-friendly experience to make strong security feel easier than ever.

  • Access Management by Duo

    Duo protects against breaches with a leading access management solution that provides strong multi-layered defenses and innovative capabilities that allow legitimate users in and keep bad actors out. For any organization concerned about being breached and needs a solution fast, Duo enables strong security while also improving user productivity.

  • The Total Economic Impact™ Of Cisco Duo Infographic

    Through four customer interviews and data aggregation, Forrester concluded that Cisco has the following three-year financial impact; view the infographic for a summary of solution benefits, user quotes, and the real ROI of Cisco Duo.

  • Access Management Buyer's Guide

    The modern workforce is rapidly becoming more mobile and hyperconnected, and attackers are taking note. But with attackers constantly innovating and finding new ways to bypass weaker multifactor authentication (MFA) implementations, how can you authorize users and devices without putting the network at risk?

  • The Total Economic Impact™ Of Cisco Duo

    Cisco Secure Access by Duo uses a multi-layered approach to secure access to applications in the cloud or on-premises with multifactor authentication, single sign-on, and device posture checks. For a complete look at Duo's value to a business, get the key financial data points in The TEI of Cisco Duo study.

  • 7 steps to advanced anomaly detection

    Detect and remediate compromised accounts proactively and harden network defenses with Duo Trust Monitor, which delivers advanced anomaly detection by surfacing risky access events.

  • The Power of Risk-Based Authentication: Placing Users in the Driver's Seat

    Attackers are increasingly targeting account takeovers in an attempt to gain access to corporate resources. Duo’s new Risk-Based Authentication dynamically detects potential threat signals and adjusts security requirements. Join this webinar to learn more about Duo’s Risk-Based Authentication.

  • Healthcare Shifts in Cybersecurity

    The healthcare industry faces some of the strictest rules and regulations, and any cyberattack on a hospital – ransomware or otherwise – becomes a literal matter of life and death. In this free guide, learn how multi-factor authentication (MFA), single sign-on (SSO), and other technologies help healthcare adopt and deliver zero trust access.

  • How to Prevent Attacks that Bypass MFA Webinar

    Attackers are increasingly using MFA Fatigue to wear down a user's patience and diligence with repeated fake MFA prompts, only to ultimately pose as a helpful IT support person. Fortunately, there are ways to defend against these attacks. Watch this on-demand webinar to hear directly from an in-the-field researcher how to strengthen authentication.

  • Customer Case Study: Cosentino

    Cosentino unifies networking and security to power innovation from anywhere. Find out how Umbrella helped them achieve their goals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.