ComputerWeekly.com Research Library

Powered by Bitpipe.com

All Research Sponsored By:Barracuda

  • Barracuda Backup Overview

    Tune into this video for an overview of Barracuda’s backup solution, which includes multiple form factors to deliver fast, easy, and flexible protection for all of your workloads—regardless of location.

  • Barracuda Ransomware Solutions

    In this video, learn how Barracuda can help you detect, prevent, and if need be, recover from ransomware.

  • Global Transit Network Architecture with Azure Virtual WAN

    When deployed together, Azure virtual WAN and the Barracuda cloud-gen firewall have the potential to provide powerful and advanced distributed networking with efficient, high-speed cloud connectivity and strength in security. Download this short video to learn more.

  • Deploying SD-WAN Environment with Barracuda

    In this short video, walk through the steps to deploying an SD-WAN with Barracuda’s cloud generation firewalls.

  • Matson and Isom Case Study

    When technology consulting firm Matson & Isom assessed nonprofit public benefit organization Youth for Change, they noticed some gaps when it came to backup and recovery. Watch this video case study to learn how a Barracuda DR solution worked for Youth for Change and discover how it can protect your company’s critical data.

  • Barracuda Forensics and Incident Response

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Barracuda Cloud-to-cloud Backup

    Microsoft, as stated in their service agreement, is only responsible for the availability of their service, not for backing up your data. Tune into this video for a walkthrough of Barracuda’s cloud-to-cloud backup, which will ensure your Office 365 data is protected as needed.

  • Barracuda Essentials Overview

    In this short video, learn how you can protect your business from advanced email threats like ransomware, phishing, and data loss with Barracuda Essentials.

  • Protecting Business and Remote Workers from COVID-19 Email Threats

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • Extending Secure Access to Remote Workers

    These are extraordinary times, and the sudden shift to a very widespread remote-work model is creating security and network-administration challenges that you may never have faced before. Join this webinar to find out how you can ensure secure and reliable access to online resources for all your users.

  • Enable and Secure Remote Work During the COVID-19 Pandemic

    The recent global outbreak has led to a dramatic and rapid movement towards remote workforces, and IT teams are tasked with ensuring each employee and device is enabled and secure. This solution brief highlights the key features of a few Barracuda offerings designed to take the stress out of this shift. Read on to learn more.

  • Web Application Firewall Vendor Comparison Report

    The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.

  • Dutch DIY Giant Shelves Email Attacks

    As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.

  • Spear Phishing: Top Threats and Trends

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

  • The Rise of Email Threats

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Tech-Savvy English Public School Streamlines Office 365 Security

    Download this case study to learn how IT Director Tony Whelton was ultimately able to provide the Wellington College’s students and staff with more flexible, secure notebook protection without straining IT budget or resources.

  • Cloud Security Guardian Integration with Microsoft Azure 2019

    Designed to integrate with Microsoft Azure 2019 and to leverage built-in security and alerting features, the Cloud Security Guardian will help you establish end-to-end cloud security visibility—a critical requirement in this era of increasing compliance mandates. Tune in now to see how it works.

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • Cloud Security Guardian integration with Microsoft Azure 2019

    In this video, learn about Barracuda Cloud Security Guardian and how it orchestrates, automates, and simplifies configuration and management across all of your Azure firewalls.

  • SD-WAN: When the Internet Becomes the New Network

    As digital transformation drives adoption of, and dependence on, cloud-hosted applications and data, traditional network architecture is growing burdensome. That's why organizations are increasingly turning to SD-WAN. In this white paper, learn about the drivers for SD-WAN, how to transition away from MPLS, how to secure SD-WAN, and more.

  • Special Report: 2019 Email Security Trends

    How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.

  • Network Security and the Cloud: The Basics

    Organizations turn to the public cloud for its massive, on-demand compute and storage capabilities. But none of those capabilities matter if there isn't proper networking and security policies to ensure applications run safely and smoothly. In this expert guide, learn methods to properly secure your network as you migrate to the cloud.

  • Connected Business: Next-generation Networks for Retailers

    The following paper explains the benefits of using SD-WAN to efficiently deploy applications to highly distributed offices and stores. To learn how you can take advantage of SD-WAN's flexible network capabilities, read on now.

  • Application Optimization for SD-WAN

    Watch this video for a walkthrough of how to reduce latency and improve cloud app performance in SD-WAN environments using a cloud-based firewall.

  • Barracuda Advance Security for Your SD-WAN

    Tune into this video for tactical guidance on how to securely onboard a branch office in an SD-WAN environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.