ComputerWeekly.com Research Library

Powered by Bitpipe.com

Application Security Research

  • Digital Transformation at the Enterprise Edge

    Sponsored by: CradlePoint

    Required capacity to connect is at an all-time high. Network security must be threat-ready, WANs must deliver performance and edge-to-cloud latency must be as low as possible. Is your network prepared? Watch this webcast for a deeper view of enterprise digital transformation and the technologies that are taking the lead.

  • Business Continuity: What Have We Learned So Far?

    Sponsored by: Akamai Technologies

    Organizations have asked their employees to work remote, and they’ve done their best to scale digital transformation as a result. These changes have supported workforce productivity requirements, but they’ve also created an expanded attack surface and unforeseen complexity. Watch this webcast to learn how organizations can adapt to the new normal.

  • Webinar - Defend Better and Respond Faster With Security That Works Together

    Sponsored by: Cisco Umbrella

    Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.

  • SIG - AV-TEST: DNS-Layer Protection and Secure Web Gateway Security Efficacy Test Results

    Sponsored by: Cisco Umbrella

    AV-TEST is an independent research institute for IT security. In November and December 2019, AV-TEST performed a review of Cisco cloud security solutions alongside comparable offerings. The test was commissioned by Cisco to determine the malware protection and phishing block capabilities of all vendors. Read this report to see the results.

  • Third Party Script Application Security: Intrusion vs Detection

    Sponsored by: Akamai Technologies

    Emerging tactics among credit card skimming attacks are underlying the need to fortify security to stay ahead of these increasingly devastating campaigns. This 20-minute video provides a brief history of Magecart attacks and the rise of third-party scripts. Watch now to learn more about these threats and better understand how to mitigate them.

  • SD-WAN Overview

    Sponsored by: Arrow

    30% - 50% of large enterprise traffic is shifting to the cloud, making traditional WAN suboptimal. With the heightened need for cloud apps, bandwidth and security, SD-WAN may be the only way your organization will be able to keep up. Take a look at SD-WAN for Dummies to read in-depth on the functionality and cost-saving benefits of SD-WAN.

  • Webinar - SASE Convergence of Cloud Security and Networking

    Sponsored by: Cisco Umbrella

    It’s the new normal, and ensuring security for this cloud-centered reality is paramount. Businesses must deepen visibility, protection and control of internet traffic while simplifying security deployment and management. Watch this webinar to learn how Cisco is breaking new ground with a SASE as well as unified SD-WAN and cloud security offers.

  • SASE For Dummies

    Sponsored by: Cisco Umbrella

    Today’s IT teams must securely enable roaming users, devices, and SaaS apps without adding complexity or reducing performance. Likewise, they must develop strategies to protect users from a variety of evolving threats. Read this e-book to examine the changing network and security landscape and steps you can take to keep your organization secure.

  • SIG - Farm Credit Customer Story

    Sponsored by: Cisco Umbrella

    Farm Credit needed to keep customer data secure while protecting its distributed, highly mobile workforce from threats no matter where employees were. They wanted a holistic, secure web gateway solution with robust capabilities, early-lifecycle threat mitigation, and seamless integration. Read this case study to go in-depth on their success.

  • Tata Communications’ Secure Web Gateway

    Sponsored by: TATA Communications

    As applications, infrastructures and data continue to move to the cloud, ensuring users have appropriate and reliable access – regardless of location – is critical. In this short video, discover how Tata Communications’ Secure Web Gateway enables users with enhanced visibility and security.

  • TikTok Case Study

    Sponsored by: Lookout

    Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.

  • Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive

    Sponsored by: Lookout

    IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.

  • Secure, Cloud-Controlled Network to Enable Work From Home

    Sponsored by: CradlePoint

    When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.

  • Simple, Secure Networking with SD-WAN

    Sponsored by: Verizon

    Digital transformation has changed from a ‘down-the-road’ initiative to an action item. With the changing application landscape and increase in cloud connectivity, organizations need to become more adaptable – and fast. View this webcast on how SD-WAN can galvanize transformation by amplifying network performance and security.

  • Securing Assets Using Micro-Segmentation: A SANS Review of Guardicore Centra™

    Sponsored by: Guardicore

    With the increasing complexity and interconnectivity of organizational environments, IT professionals are left to wonder how to prevent the threat of network attacks. Enter microsegmentation: a network security architecture that laterally moves unapproved connections. Fewer permissions, less vulnerability. Dive into this SANS report to learn more.

  • Red Hat and Synopsis Podcast

    Sponsored by: Red Hat Synopsys

    Learn how to safeguard against poor security at every level and layer of your cloud-native environment in this podcast, which features insight from TechTarget, Red Hat, and Synopsis experts.

  • OpenShift Container Adoption Webinar Series: Security

    Sponsored by: Red Hat Synopsys

    The most common misconception for container security is that, since your applications are in containers, they are secure. In reality, applications are your biggest attack surface—and that risk is present in every single layer of the stack. Learn more about debunking container security myths in this resource.

  • Real World SD-WAN from MTM Technologies + CISCO (NYC Story)

    Sponsored by: MTM Technologies

    If you’re part of an organization with a goal of digitally transforming their network architecture, capabilities and security, then it may be worth educating yourself on the paradigm-shifting SD-WAN.In this video, learn how a company with global design, manufacturing and retail locations was able to optimize their network operations with SD-WAN.

  • The Benefits of a Software Defined Secure Branch with Versa Networks

    Sponsored by: Verizon

    Branch or remote office network architectures have barely changed for more than 15 years, but what is required of them has significantly evolved. Today’s digital enterprises require a network landscape that is agile, intelligent, secure and reduces operational complexity while being cost-effective. This white paper reveals what you may be missing.

  • Workload Security: Visibility and Analysis for Cloud and Container Workloads

    Sponsored by: Lacework

    The modern cloud infrastructure requires a shift in the approach to workload security. Download this solution brief to learn more about Lacework’s automated approach to enabling visibility and analysis for cloud and container workloads.

  • Jitterbit Secures Dynamic Cloud Environment, Containers, and Microservices at Scale.

    Sponsored by: Lacework

    In this case study, discover how Jitterbit, and API service provider, was able to address issues related to monitoring activity within their expanding platform by partnering with Lacework to enable holistic activity tracking, streamlined compliance reporting and comprehensive security – without disruption.

  • Webinar: Application Fluency through Automated SD-WAN

    Sponsored by: Oracle Communications

    How can software-defined networking optimize network architecture to enhance application performance? This Doyle Research webcast, presented by Oracle, gives an overview of SD-WAN and how it helps you get the most out of your mission-critical apps.

  • Wavefront Secures DevOps Environments at Scale with Lacework

    Sponsored by: Lacework

    Due to the continually changing nature of their public cloud environment, Wavefront was facing visibility and security issues related to detecting and tracking vulnerabilities and threats. Download this white paper to see what led to their partnership with Lacework, as well as the results.

  • Carson Living Secures Rapidly Growing Cloud Environment

    Sponsored by: Lacework

    Due to the rapid growth in adoption (400% in the past year) of their AWS-hosted application, Carson Living was facing issues related to ensuring cloud compliance and maintaining security configurations. Download this white paper to see what led to their partnership with Lacework, as well as the results.

  • The 5 Most Dangerous New Attack Techniques and How to Counter Them

    Sponsored by: RSA Conference

    What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.