ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Hardware Research

  • Understanding Network TAPs

    Sponsored by: Gigamon

    Network security depends not only on common communication protocols but also on the ability to decipher what’s actually in those packets. There’s a simple solution to this that provides visibility into networked traffic: network TAPs. Read the white paper to gain a full understanding of why TAPs are the most effective way to copy network traffic.

  • Assessing the Strengths and Weaknesses of SD-WAN Technology

    Sponsored by: Cato Networks

    SD-WAN is a complex area and a recent Gartner report explains how to sift through that complexity by identifying the technology’s architectural components, typical deployment models, and key evaluation criteria. In this white paper, learn how Cato addresses these points.

  • Smooth the Transition to the Cloud with Radware’s Secure ADC Solutions

    Sponsored by: Radware

    Many enterprises are transitioning to the cloud. As a result, their focus shifts from infrastructure-centric environments to application-centric solutions. This creates the unique challenge of how to make advanced services, such as application delivery and security simpler to consume and maintain. In this brief, learn how Radware’s ADC can help.

  • Research Reveals: Network Security is Converging in the Cloud

    Sponsored by: Cisco Umbrella

    Network security is no longer confined to the data center. Its new address is in the cloud. In this webcast, learn why Gartner is introducing a new market category, the secure access service edge (SASE), which converges security services in the cloud.

  • Exploring the SD-WAN Business Case

    Sponsored by: 128 Technology

    With the right product, the basic business case for SD-WAN can be expanded significantly. However, that doesn’t mean that making an SD-WAN business case is easy. In this report, explore a cost model of enterprise networking to assess the way SD-WAN deployments have impacted costs at many organizations.

  • MPLS, SD-WAN, Internet, and SASE

    Sponsored by: Cato Networks

    The WAN is the backbone of the business. It ties together your remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. In this white paper, learn about the connectivity, optimization and security options that are needed when building a network for the digital business.

  • A Guide to SD-WAN ROI with Riverbed SteelConnect EX

    Sponsored by: Riverbed

    EMA research found that SD-WAN solutions deliver positive ROI, and can do so rather quickly. 65% of enterprises engaged with SD-WAN expect to earn an ROI with the solution within 2 years or less. In this report, explore the potential ROI that an enterprise can earn when it implements Riverbed’s SD-WAN solution, SteelConnect EX.

  • Network Security Made Simple

    Sponsored by: Cisco Umbrella

    In this e-book, look at the challenges facing today’s security professionals and explore some simple actions you can take to reduce malware, simplify security and improve network performance.

  • Industrial Giant Discovers 200,000 Network Endpoints in One Day

    Sponsored by: Beta Systems

    One of the world’s leading industrial companies planned to roll out IEEE 802.1X-based authentication. To pinpoint the scope and cost of this project, the industrial giant needed a precise categorization of all devices on its network. In this case study, learn why the company decided to use Auconet BICS to discover their network devices.

  • Definitive Guide to Next-Generation Network Packet Brokers

    Sponsored by: Gigamon

    Download the Definitive Guide to Next-Generation Network Packet Brokers (NGNPBs) and discover the immediate benefits of shifting your infrastructure strategy to include NGNPBs. You’ll experience expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats.

  • Business Infrastructure Control System – BICS

    Sponsored by: Beta Systems

    Up to 20% of network devices are undetected and unmanaged. This is dangerous; you cannot protect what you don’t see. In this brief, learn how The Business Infrastructure Control System (BICS) can help your organization find and control all your switches, routers, and endpoints, including those which popular NAC tools miss.

  • Network Security Management for IT and Industrial Networks

    Sponsored by: Beta Systems

    Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.

  • Networks Start to Get SASE in 2020

    Sponsored by: Apcela

    Companies engaged in digital transformation efforts already understand that security and network services are converging. Now, that convergence has a new name: “secure access service edge,” or SASE. In this white paper, learn more about the SASE model and how it can help your organization by placing access control closer to the user.

  • SD-WAN and Office 365: What You Need to Know

    Sponsored by: Apcela

    Regardless of what phase of Office 365 adoption you are in, the O365 Network Connectivity Principles always seems to rear its head when performance is not quite what you were expecting. In this webinar, take a look at some of those principles and how technologies like SD-WAN can help (or in some cases hurt) your performance objectives.

  • Network security: public enemy number one

    Sponsored by: ComputerWeekly.com

    In addition to regular network workloads, 83% of network teams also support security teams with the assorted network security issues that organisations face today. Discover in this e-guide why network security is the public enemy number one.

  • Gigamon Insight Solution: Detect, Investigate & Remediate Network Issues

    Sponsored by: Gigamon

    In this brief white paper, learn about Gigamon's Insight Solution and how it can provide the needed visibility to detect, investigate, and remediate network issues.

  • How to Choose a Next-Generation Network Packet Broker with Confidence

    Sponsored by: Gigamon

    Download this brief infographic for a checklist of features to look for when choosing a next-generation network packet broker.

  • Network Security and the Cloud: The Basics

    Sponsored by: Barracuda

    Organizations turn to the public cloud for its massive, on-demand compute and storage capabilities. But none of those capabilities matter if there isn't proper networking and security policies to ensure applications run safely and smoothly. In this expert guide, learn methods to properly secure your network as you migrate to the cloud.

  • How To Strengthen Security While Optimizing Network Performance

    Sponsored by: Gigamon

    Download "How to Strengthen Security While Optimizing Network Performance" to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability.

  • Network Architecture with Security in Mind

    Sponsored by: Gigamon

    Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.

  • The Surprising Ways that Inline Bypass Helps Protect Network Operations

    Sponsored by: Gigamon

    In this white paper, learn about inline bypass and how it can help remove failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Find out how you can maximize threat prevention, security resilience and network uptime.

  • Connected Business: Next-generation Networks for Retailers

    Sponsored by: Barracuda

    The following paper explains the benefits of using SD-WAN to efficiently deploy applications to highly distributed offices and stores. To learn how you can take advantage of SD-WAN's flexible network capabilities, read on now.

  • Application Optimization for SD-WAN

    Sponsored by: Barracuda

    Watch this video for a walkthrough of how to reduce latency and improve cloud app performance in SD-WAN environments using a cloud-based firewall.

  • How Application Delivery Controllers Have Evolved to Meet New Demands

    Sponsored by: Citrix

    ADCs are physical or virtual devices deployed between applications and users. They intercept session traffic between applications and users and provide a range of functions designed to optimize the end-user application experience. Download this e-guide to learn more about ADCs are how they evolved over the years to meet new demands.

  • Securing the SD-WAN: The Next Network Challenge

    Sponsored by: Cisco Umbrella

    How does adopting SD-WAN affect security? Download this expert guide for tips on securing SD-WAN, and find out why security is an essential part of the migration process.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.