ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Authentication Protocols Research

  • Secure Branch-to-Public-Cloud Connectivity with SD-WAN

    Sponsored by: Barracuda

    This paper highlights an SD-WAN architecture that manages security, networking, and app prioritization transparently across your entire organization—including all public cloud deployments. To learn how to achieve always-on app availability regardless of branch or office location, view the paper here.

  • MPLS Replacement with Broadband and Secure SD-WAN

    Sponsored by: Barracuda

    This paper presents an alternative: using SD-WAN protected by cloud-based firewalls to reduce costs and increase availability. Read on to learn how this approach simplifies deployment for all of the firewalls across your sites and gives you the added benefit of built-in redundancy and a more robust network.

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • Intervention areas for superfast broadband project Connecting Cumbria

    Sponsored by: ComputerWeekly.com

    UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • Essential Enterprise Mobile Security Controls

    Sponsored by: SearchSecurity.com

    How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.

  • Automation in the Software-Defined Network

    Sponsored by: VMware and Circle IT

    In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.

  • Automation in the Software-Defined Network

    Sponsored by: VMware and Presidio

    In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • Just Released: Magic Quadrant for Network Access Control

    Sponsored by: Forescout Technologies, Inc.

    Network access control (NAC) vendors are realizing the necessity of integration with other mobile device management (MDM) and security technologies. When choosing a NAC solution, the ability to integrate is a top concern -- but what else should you consider when evaluating various vendors?

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Redefining Cloud Network Virtualization with OpenFlow

    Sponsored by: NEC Corporation of America

    NEC ProgrammableFlow takes a first step toward end-to-end network-level virtualization with the potential to make a radical impact on how cloud networks are operated, managed and scaled.

  • The CIO's Guide to Mobile Security

    Sponsored by: BlackBerry

    Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.

  • Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization

    Sponsored by: Bradford Networks

    Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.

  • How Does Ping Really Work?

    Sponsored by: Global Knowledge

    The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.

  • Networking Basics: What You Need to Know

    Sponsored by: Cisco Systems, Inc.

    When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more.

  • Best Practices in Authentication and Access Control

    Sponsored by: Nevis Networks

    Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.