ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Barracuda

  • Web Application Firewall Vendor Comparison Report

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • Dutch DIY Giant Shelves Email Attacks

    As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.

  • Spear Phishing: Top Threats and Trends

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

  • The Rise of Email Threats

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Tech-Savvy English Public School Streamlines Office 365 Security

    Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Cloud Security Guardian integration with Microsoft Azure 2019

    In this video, learn about Barracuda Cloud Security Guardian and how it orchestrates, automates, and simplifies configuration and management across all of your Azure firewalls.

  • SD-WAN: When the Internet Becomes the New Network

    As digital transformation drives adoption of, and dependence on, cloud-hosted applications and data, traditional network architecture is growing burdensome. That's why organizations are increasingly turning to SD-WAN. In this white paper, learn about the drivers for SD-WAN, how to transition away from MPLS, how to secure SD-WAN, and more.

  • Special Report: 2019 Email Security Trends

    How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.

  • Network Security and the Cloud: The Basics

    Organizations turn to the public cloud for its massive, on-demand compute and storage capabilities. But none of those capabilities matter if there isn't proper networking and security policies to ensure applications run safely and smoothly. In this expert guide, learn methods to properly secure your network as you migrate to the cloud.

  • Connected Business: Next-generation Networks for Retailers

    The following paper explains the benefits of using SD-WAN to efficiently deploy applications to highly distributed offices and stores. To learn how you can take advantage of SD-WAN's flexible network capabilities, read on now.

  • Application Optimization for SD-WAN

    Watch this video for a walkthrough of how to reduce latency and improve cloud app performance in SD-WAN environments using a cloud-based firewall.

  • Barracuda Advance Security for Your SD-WAN

    Tune into this video for tactical guidance on how to securely onboard a branch office in an SD-WAN environment.

  • Agile Software Testing Pioneer Slams the Door on C-level Email Attacks

    Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.

  • Barracuda Advanced Threat Protection for SD-WAN

    Tune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.

  • Barracuda SD-WAN Zero Touch Deployment

    Tune into this video for a brief walkthrough of how to use Barracuda CloudGen Firewall to deploy SD-WAN.

  • Barracuda SD-WAN Overview

    SD-WAN aims to relieve you of some of the burdens associated with MPLS circuits. Tune into this video for more info on the importance of SD-WAN in the cloud era, 7 key components of SD-WAN, and more.

  • The Top Industries at Risk for Cyber Attacks

    This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.

  • Email Protection with Asaf Cidon

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • An Overview of Barracuda PhishLine

    The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.

  • Barracuda Lightboard: Total Email Protection

    This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.

  • Spear Phishing: Top Threats and Trends

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

  • Understanding and Preventing Finance Phishing Fraud

    Today's hackers and cybercriminals are doubling-down to heavily target finance department employees and execs with fraudulent phishing emails. Why? To get the whole story on this fast-growing phishing threat and to view several new strategies for fighting back, join this webinar.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.