ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Protocols Research

  • Extreme Virtual SLX Software

    Sponsored by: Extreme Networks

    In this solution brief, learn about Extreme Networks' Virtual SLX (vSLX) that provides a virtualized instance for their switching & routing product line with support for MPLS, BGP, EVPN, and VXLAN.

  • SD-WAN Benchmarking Best Practices for QoS

    Sponsored by: Infovista

    Read this white paper to review key capabilities of QoS systems and find out why it's considered a critical component of smart SD-WAN. Also, learn how to properly compare different QoS products prior to implementation to help determine if they can meet your needs.

  • How Passive Monitoring Can Streamline NERC CIP Compliance

    Sponsored by: Forescout

    The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards are a set of requirements designed to secure the assets required for operating North America's bulk electric system. In this e-book, learn how SilentDefense can help North-American utilities by saving considerable effort and money.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • 5 Questions to Ask in Global Network Services RFPs

    Sponsored by: MASERGY

    Download this resource for tips on creating RFPs for global network services, and find out 5 must-have questions to include in your RFP.

  • Is Your WAF Keeping Pace With Today's Threats?

    Sponsored by: F5 Networks

    Cyberattackers are starting to target the application layer, which if breached allows attackers to access the interfaces that hosts use to communicate and access information sent over a network. Read this white paper to learn how to choose a web app firewall (WAF) that protects your network.

  • Focus: Network security

    Sponsored by: ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • Network Purchasing Intentions 2013

    Sponsored by: ComputerWeekly.com

    This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.

  • Intervention areas for superfast broadband project Connecting Cumbria

    Sponsored by: ComputerWeekly.com

    UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • How SSL-Encrypted Web Connections are Intercepted

    Sponsored by: SearchSecurity.com

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

  • Improve BYOD with the Bonjour Protocol

    Sponsored by: Aerohive Networks

    This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.

  • CW Buyer's Guide: IPV6 Migration

    Sponsored by: ComputerWeekly.com

    This Computer Weekly Buyer's guide takes you through the steps you need to take to migrate to IPv6 and explains the potential impact on your business.

  • Next Generation Network Management Techniques

    Sponsored by: SearchSecurity.com

    The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!

  • What to Look for in Secure Sockets Layer

    Sponsored by: SearchSecurity.com

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

  • The Swiss Army Knife for the Network Analyst

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study covers a tool that helped one company with their network and protocol analysis.

  • SIP trunking services close cost gaps around mobility

    Sponsored by: Cox Communications, Inc.

    Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.

  • Adaptive Packet Filtering

    Sponsored by: Gigamon

    This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

  • Extreme Networks Solution with NEC

    Sponsored by: Extreme Networks

    Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.

  • OpenFlow and SDN: What's in Store?

    Sponsored by: Big Switch Networks

    This expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.

  • IPv6 Addressing Plan Basics

    Sponsored by: Infoblox

    Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Key Considerations for MPLS IP-VPN Success

    Sponsored by: XO Communications

    Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!

  • How to Save Time and Money Making Your Transition to IPv6

    Sponsored by: Cisco Systems, Inc.

    This white paper discusses 9 strategies that can save your business time and money while transitioning to IPv6, by slowing the need for replacements and mitigating risks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.