ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software Research

  • Delivering a More Secure Network From the Start

    Sponsored by: Aruba Networks

    Remote work has accelerated the move to cloud. What’s your plan to deliver the network performance improvements and close security gaps? A Zero Trust Edge solution can help by securely connecting and transporting traffic in and out of remote sites leveraging cloud-based security and networking services. Download this infographic to learn more.

  • Comparison and Analysis of Security Aspects of LoRaWAN and NB-IoT

    Sponsored by: Telekom Deutschland GmbH

    The two most commonly used LPWA technologies today are NarrowBand IoT (NB-IoT) and Long Range Wide Area Network (LoRaWAN). While more and more IoT use cases use NB-IoT or LoRaWAN technology, security specialists have observed IoT-related attacks increasing sharply for years. In this white paper, take a look at the security of NB-IoT and LoRaWAN.

  • Availability and Buying Options in the Emerging SASE Market

    Sponsored by: Palo Alto Networks

    Separate networking and security infrastructures no longer fit enterprise needs. Secure access service edge, or SASE, converges the two, creating an identity-centric network environment that improves service delivery with security built in. View this research report to learn buying options for SASE and how vendors compare.

  • The iboss cloud Zero Trust Network Access (Z TNA) Private Access Platform architecture

    Sponsored by: iBoss

    Organizations deploying and using legacy network security appliances to protect cloud connectivity and internet access are faced with the problem of the disappearing network perimeter. But zero trust network access can ensure fast, compliant and secure connections from anywhere. Download this white paper to explore zero trust in detail.

  • Five Key Steps To Securely Connect Your Remote Workforce

    Sponsored by: Intrado

    After the initial scramble to enable employees to stay safe by working from home, companies are now able to take stock of the situation and address any security gaps. In this white paper, uncover 5 key steps to help you create a long-term sustainable plan for secure remote working.

  • What is secure SD-WAN?

    Sponsored by: Infovista

    As more and more organizations leverage cloud resources, network threats loom larger and larger. But secure SD-WAN lets you secure and control the extended edge, contracting your attack surface. And with web security gateways (WSGs) and firewalls, you’ve got a security 1-2 punch. Dive into this guide to discover secure SD-WAN & firewalls.

  • The Optimal SASE Enabling Plaform

    Sponsored by: Apcela

    Gartner predicts that by 2024, at least 40% of enterprises will have explicit strategies to adopt secure access service edge (SASE). What do you need to know about SASE and how it will influence your network architecture? Examine this 3-part guide, provided by Apcela, to see why SASE is the next step in the digital evolution.

  • Internal Firewalls for dummies

    Sponsored by: VMware

    Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.

  • SIG - SASE in 15 minutes

    Sponsored by: Cisco Umbrella

    Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.

  • MANAGED XDR - MANAGED DETECTION AND RESPONSE SERVICE

    Sponsored by: Trend Micro

    Today’s attacks are dangerous – monetizing intellectual property, encrypting essential data for ransom or damaging the flow of information in the case of nation state attacks. Managed extended detection and response (XDR) can provide 24/7 protection from these attacks. View this Trend Micro data sheet to see the full security layer.

  • Partnering To Deliver An Automated Secure Access Service Edge

    Sponsored by: Aruba Networks

    Cloud migration is changing traffic patterns and driving the need to transform WAN and security architectures. SASE is changing how companies build their networks, and when combined with SD-WAN, applications perform highly and threats are averted. Access this data sheet to learn about Silver Peak’s Unity EdgeConnect SD-WAN with automated SASE.

  • Secure Sd-Wan For The Cloud-First Enterprise Without Compromise

    Sponsored by: Aruba Networks

    As enterprises move to the cloud, security challenges multiply. Examine this white paper to learn how Zscaler and Silver Peak are combining their respective Cloud Security and Unity EdgeConnect SD-WAN platforms to address these challenges. And, see how they’re collaborating to deliver security orchestration for consistent security policies.

  • SonicWall Secure SD-Branch

    Sponsored by: SonicWall

    Branch networks are quickly evolving. Secure SD-Branch can provide security, network segmentation and compliance for peace of mind on distributed networks. SonicWall Secure SD-Branch aims to simplify deployment, management and troubleshooting. Access this solution brief to explore potential benefits.

  • Are Your Branch Sites an Open Door to Cyberattacks?

    Sponsored by: SonicWall

    Traditional methods of deploying and maintaining security at branch sites have become ineffective, expensive and unmanageable. But an SD-Branch solution can form a cornerstone for boundless security in distributed enterprise environments. Jump into this white paper to see why the time for SD-Branch is now.

  • Vitens Moves to Cloud Security with BloxOne™ ThreatDefense from Infoblox

    Sponsored by: Infoblox

    Vitens is the largest drinking water utility in The Netherlands, delivering water to 5.6 million people. In an effort to strengthen security, Vitens set out to improve visibility into their network infrastructure and endpoints. Download this case study to see how Infoblox’s BloxOne Threat Defense gave Vitens oversight they needed to succeed.

  • Securing Remote Workers In The Age Of Teleworking

    Sponsored by: Infoblox

    Remote workers are seeking access to enterprise resources from a variety of endpoints, both work-provided and personal, as well as various mobile devices. But many of the cybersecurity procedures designed for enterprise facilities won’t work from remote locations. Explore this detailed guide to learn how to secure remote workers intelligently.

  • Advanced Technology Solutions from NWN

    Sponsored by: NWN Corporation

    Your business’s end users need to stay connected, especially in today’s ‘work-from-anywhere’ ecosystem. But too many IT departments face poor connectivity and limited visibility – and both lead to increased costs. Leverage this white paper to learn about an experience management platform that strives to alleviate these issues.

  • 2021 Top Sd-Wan Edge Trends

    Sponsored by: Silver Peak

    SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.

  • Architecting a Secure Business-Driven SD-WAN

    Sponsored by: Silver Peak

    SD-WAN delivers the ability to actively utilize low-cost broadband services. But because broadband services are ‘public’ instead of ‘private,’ advanced security capabilities are required to ensure the confidentiality and integrity of application traffic traversing such connections. Access this white paper to learn about Silver Peak’s secure SD-WAN.

  • The Forrester Wave: Security Analytics Platforms, Q4 2020

    Sponsored by: Splunk

    Security analytics are both emerging and evolving. Providers that offer customizability, map to the MITRE ATT&CK framework and have a vision for extended detection and response (XDR) give themselves an advantage. To learn more about security analytics providers and how they stack up, access The Forrester Wave: Security Analytics Platforms, Q4 2020.

  • IoT Platform Leader Armis Eliminates Dependency on VPN Technology, Adopts Axis Zero Trust Solution

    Sponsored by: Axis Security

    Armis Security, an enterprise-class IoT device security platform, had identified an opportunity to further mature and optimize remote access use cases. This is because at the time, their solution had been providing a less-than-optimal user experience, and their threat response was not real-time. Browse this case study to see how Axis helped.

  • Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access

    Sponsored by: Axis Security

    VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.

  • Understanding Secure Access Service Edge (Sase) Architectures

    Sponsored by: Citrix

    Increased usage of cloud apps and services, a spike in remote work and evolving security threats are all calling SASE to action. This cloud-based networking & security architecture is changing the game for organizations of all sizes in the cloud and mobile-first era. Dive into this white paper to understand how these services work.

  • Barracuda CloudGen Access

    Sponsored by: Barracuda

    Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.

  • What is a Secure Remote Worker?

    Sponsored by: Capcon Networks

    Many are now working from home, but that doesn’t necessarily make them ‘remote’. To call an employee ‘remote’ would require them to have all the tools they need – namely, access to all their apps, in both private and public clouds, on any device, without sacrifice of performance or security. Watch this 2-minute video for more details.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences