ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software Research

  • Privileged Access Management (PAM) as a Service For Dummies, CyberArk Special Edition

    Sponsored by: CyberArk Software, Inc

    Has your organization suffered from a preventable vulnerability? Has one your employees committed a cybercrime even though they were granted access? Does your architecture have security gaps that need closing? Read ‘Privileged Access Management (PAM) as-a-Service for dummies’ to find out how to secure accounts and reduce risk.

  • Phishing Factories Exploit Trust to Attack Businesses

    Sponsored by: Akamai Technologies

    As if it wasn’t enough to worry about attacks from independent threat actors, there is now an emerging underground economy of phishing ‘factories’ using more sophisticated social engineering tactics to gain trust among victims. Is your organization prepared? Read this article to discover alarming trends about phishing and how to increase awareness.

  • Tried and Tested: The New Paradigm in the Workplace

    Sponsored by: NTT

    The COVID-19 lockdown has forced the acceleration of companies' digital transformation agendas, with important advancements in employee engagement, productivity and security. In this IDC report, learn more about how the new paradigm or work is transforming the workplace, workforce and work culture.

  • SIG - AV-TEST: DNS-Layer Protection and Secure Web Gateway Security Efficacy Test Results

    Sponsored by: Cisco Umbrella

    AV-TEST is an independent research institute for IT security. In November and December 2019, AV-TEST performed a review of Cisco cloud security solutions alongside comparable offerings. The test was commissioned by Cisco to determine the malware protection and phishing block capabilities of all vendors. Read this report to see the results.

  • MSS | Tata Communications’ Network Attack Detection Platform

    Sponsored by: TATA Communications

    Oragnizations’ defenses may be taking up to 276 days to respond, and in today’s high-speed world, 3/4 of a year is not going to cut it. Your network needs to be readier for DDoS attacks than ever before, and network analytics may be what best prepares it. Watch this brief video to learn more about network analytics from Tata Communications.

  • When Everything is Closed, Keep Your Business Open with Remote Access

    Sponsored by: Aruba Networks

    When the unexpected happens, it doesn’t have to mean downtime for your business. In this infographic, learn how Aruba remote access solutions can help provide your business with seamless access, always-on connectivity, zero-touch provisioning, and more.

  • Maintain Business Continuity with Aruba's Remote Access Solutions

    Sponsored by: Aruba Networks

    More people than ever before are now working remotely. But everyone still needs secure, reliable access to systems and applications, no matter where they are. How do you open up your network and still keep data secure? In this brief, learn how Aruba’s remote access solutions can help.

  • Video: Latest Credential Stuffing Attack Campaigns in Asia Pacific

    Sponsored by: Akamai Technologies

    Businesses struggle to deal with the challenge of bot and botnet attacks on their networks. Because security networks are less agile, IT departments scramble when an unknown IP is detected, and by this time, it’s usually too late. Watch this webcast to learn more about credential stuffing, a type of botnet attack that is used to gain user access.

  • Cbus Embraces SD-WAN to Power Their Digital Transformation

    Sponsored by: Dimension Data

    Cbus has undertaken a multi-year transformation program putting in place the technology platforms they need to meet their member’s evolving customer service expectations. Underpinning this digital capability is a secure, private SD-WAN environment designed, deployed and managed with the help of NTT Ltd. Download this case study to learn more.

  • Aruba Edge Services Platform

    Sponsored by: Aruba Networks

    In this white paper, learn how the Edge Services Platform from Aruba can help deliver proactive and intelligent network management capabilities to help meet the needs of network operators.

  • Video: Decoding Magecart/Web Skimming Attacks

    Sponsored by: Akamai Technologies

    Cyberthreat actors have taken note of the increased reliance on the internet due to COVID-19. More specifically, they are eyeing the sharp growth in online transactions. They are using web skimming, a hacking technique that injects malware onto a payment page to steal the payment information. Watch this webcast to learn more.

  • Security Anytime, Anywhere, Any Device

    Sponsored by: TATA Communications

    In today’s mobile world, users can access the Internet via your network at any location, over any device. But to help your enterprise avoid being compromised, you need to be sure that every user access point is secure. In this brief, learn how Tata Communications’ Secure Web Gateway can help you ensure all your web communications are secure.

  • The Power of our Infrastructure is the Power of your Success

    Sponsored by: TATA Communications

    In this short video, learn more about Tata Communications and their portfolio of solutions which includes managed security, mobility, IoT, network services and more.

  • Overcome Alert Fatigue with Actionable Threat Intelligence

    Sponsored by: Bitdefender

    Organizations want to defend from threats, but because of the sensory overload caused by constant alerts, IT departments are suffering from alert fatigue. Fortunately, threat intelligence can use data to alleviate this issue. Watch this webcast to learn more.

  • 2020 Webroot Threat Report

    Sponsored by: Webroot

    In 2019, 93.6% of malware detected was only seen on a single PC. This is significant because it shows that it only takes one mistake from one employee to compromise a network. Organizations are looking for ways to defend against threats, but to do so, they must first know their enemy. Read this threat report to see the statistics of cybersecurity.

  • Transforming FSIs: Re-Imagining a Network Architecture Fit for the Future

    Sponsored by: TATA Communications

    In this IDC report, Cyrus Daruwala of IDC caught up with Andrew Yeong of Tata Communications to talk about the disruptive changes in the financial services industry, and raise some hard-hitting issues that financial institutions need to address as they strive to adapt to the emerging ICT landscape.

  • Redefining Network Optimization for an “Anywhere Workforce”

    Sponsored by: Equinix

    Many organizations had already begun transitioning and updating their network optimization journey when the COVID-19 pandemic struck, creating fundamental changes in when, where and how employees worked. In this white paper, explore the key role network optimization will play to support new workforce business plans.

  • MSS | Secure Your Network through the Power of Tata Communications’ Intelligent Analytics

    Sponsored by: TATA Communications

    Businesses are in search of ways to protect from threats – but now, they can see them coming. Threat intelligence, predictive analytics for network security, anticipates and mitigates attacks before they hit. With threat intelligence, organizations can defend with data like never before. Watch this brief video to learn more.

  • Threat Intelligence: Shrinking the Cybersecurity Data Gap

    Sponsored by: Bitdefender

    The average cost of a data breach reached $3.92B in 2019, and this figure continues to grow year-over-year. Simultaneously, security teams are struggling to keep up with evolving threats and false positives. As a result, more companies are adopting threat intelligence. Read this white paper to learn why it’s becoming more popular.

  • Loading DLLs for Illicit Profit: A Story About a Metamorfo Distribution Campaign

    Sponsored by: Bitdefender

    Dynamic-link libraries (DLLs) are on-ramps into a network that tend to be overlooked. Hackers can hijack an organization’s DLLs leaving valuable company data vulnerable to attack and theft. Read this white paper for a closer look at how cybercriminals hack DLLs for illicit profit and how you may be able to prevent these criminals.

  • Rapidly Deployable Network for Corporate Pop-Up Health Checkpoints

    Sponsored by: CradlePoint

    As employees start returning to workplaces, many organizations are setting up health and wellbeing checkpoints outside their facilities. They need mission-critical mobile and on-site networks to keep the technology always connected. In this brief, learn how Cradlepoint can help make this possible with secure, reliable LTE connectivity.

  • Lookout Discovery: Chinese Surveillanceware

    Sponsored by: Lookout

    The Lookout Threat Intelligence team discovered 4 malware tools connected to advanced mobile threat campaigns active since 2013. China was the main target, but at total of twelve languages were targeted. To learn how to avoid these attacks, tap this brief to learn about Lookout's Threat Advisory Service & how it monitors networks/mobile devices.

  • Web Security Technical Deep Dive

    Sponsored by: Mimecast

    In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.

  • Why Your Hybrid Cloud Needs High Performance Application Delivery

    Sponsored by: Citrix

    Digital workspaces have expanded beyond the traditional corporate network creating complexity for IT. Basic load balancing alone no longer ensures applications will work without disruption. In this infographic, learn how you can take application performance and delivery to the next level with the help of Citrix ADC in AWS Marketplace.

  • Achieve Application Experience and Operational Consistency

    Sponsored by: Citrix

    Today, users expect the applications they rely on every day to function without error, and deliver the information they need on demand, around the clock wherever they are. In this white paper, learn how Citrix ADC on AWS can help deliver optimal application experience, performance, and availability.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.