ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Forensics Research

  • Around the World in 34 Phish: Covid-19 Phishing Examples

    Sponsored by: Inky Technology

    The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.

  • XDR: Extended Detection and Response

    Sponsored by: Palo Alto Networks

    Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.

  • Security Orchestration

    Sponsored by: Palo Alto Networks

    Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.

  • Why You Should Consider Endpoint Detection & Response

    Sponsored by: Claranet

    Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.

  • Automation in the Software-Defined Network

    Sponsored by: VMware and Circle IT

    In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.

  • Automation in the Software-Defined Network

    Sponsored by: VMware and Presidio

    In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.

  • Networking Monitoring Best Practices: Setting A Network Performance Baseline

    Sponsored by: Ixia

    Explore the necessities for a network performance baseline, potential challenges and how to overcome them with the tips and advice in this e-guide.

  • Video: Easy Network Management with Dell OpenManage Software

    Sponsored by: DellEMC and Intel®

    Network management is an important part of keeping your network running smooth and efficient. This brief video showcases how you can solve your network issues with asophisticated, yet simple software.

  • Network Forensics in a 10G World

    Sponsored by: WildPackets, Inc.

    This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    Sponsored by: Kaspersky

    This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Tackling Today’s Networking Challenges

    Sponsored by: HPE and Intel®

    This paper introduces the new concept of a multi-vendor network, the challenges surrounding this breed of network, trends within the industry, how to improve efficiency, and how to improve productivity when it comes to managing and infrastructure.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: SearchMidMarketSecurity

    SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.

  • Orion Network Performance Monitor

    Sponsored by: SolarWinds, Inc.

    Traditional framework solutions are expensive and tough to implement; are difficult to use, maintain and customize; and often impractical for network engineers in mid- to large-sized organizations. Network engineers need affordable, scalable network management solutions that provide immediate visibility into performance of the entire network.

  • The Need for Effective Event Management

    Sponsored by: GFI Software

    This paper examines various corporate needs and provides information on how GFI EventsManager can help corporations achieve important goals.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.