ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software Research

  • After Antimalware: Moving Toward Endpoint Antivirus Alternatives

    Sponsored by: TechTarget Security

    This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.

  • Creating a Network Endpoint Security Policy for Hostile Endpoints

    Sponsored by: TechTarget Security

    Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Navigating Today's DDoS Landscape

    Sponsored by: Ixia

    Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.

  • Five Steps to Building Visibility and Security Into Your Network

    Sponsored by: Ixia

    Discover five steps you need to take to not only build visibility and security into your network, but also get the most out of your current monitoring investments.

  • Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks

    Sponsored by: Extreme Networks

    This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.

  • Why Leaks Matter

    Sponsored by: Lumeta Corporation

    This exclusive white paper takes an in-depth look at the dangers of network leaks and how your organization can form a strategy to mitigate these risks through comprehensive visibility of connectivity.

  • Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone, and iPod Touch Users

    Sponsored by: Dell Software

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

  • 5 Steps to Network Situational Awareness

    Sponsored by: Lumeta Corporation

    This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.

  • EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager

    Sponsored by: IBM

    Many security teams struggle with the limitations of traditional, isolated security tools. For today's complex IT infrastructure, you need a comprehensive, integrated way to manage the security of your applications, network, and data.

  • Ballarat Grammar Secures BYOD with HP Sentinel SDN

    Sponsored by: Hewlett Packard Enterprise

    In this case study, explore a software-defined networking option that simplifies network monitoring for performance issues and enables a secure IT environment for users.

  • Top Five DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • Network Forensics in a 10G World

    Sponsored by: WildPackets, Inc.

    This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.

  • September Information Security Magazine

    Sponsored by: TechTarget Security

    Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • 4 Questions to Ask When Evaluating Network Security Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.

  • Top 5 DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • E-Guide: Evaluating network security virtualization products

    Sponsored by: Sophos

    This expert e-guide from SearchSecurity.com will help you determine whether virtual security options are a good fit for your organization. Inside, uncover the value of network security virtualization products, learn about security features to look for, and more.

  • Information Security Magazine – July/August 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

  • System z: Making great security even better

    Sponsored by: IBM

    Adopting an information protection approach enables your enterprise to ensure that critical data stored in your systems is authentic, secure and available. Read on to learn how proactive solutions to information protection can help minimize the risk your organization faces today.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • 10 Steps for Early Incident Detection

    Sponsored by: Tripwire, Inc.

    The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.

  • HP TippingPoint: Next Generation Intrusion Prevention System

    Sponsored by: Hewlett Packard Enterprise

    Consult this informative white paper to learn more about how intrusion prevention systems can improve the security in your business. With this security solution you can stop advanced and targeted attacks before they damage your company.

  • Cyber defense: Understanding and combating the threat

    Sponsored by: IBM

    The Global Defense Solutions Projects and Defense Exchange Conference (SPADE) is held annually to bring together organizations involved in network-centric operations, intelligence activities and other defense aspects. This resource explains some of the important topics.

  • Telecom Carrier Offers First-of-its-Kind Cloud Security Solution

    Sponsored by: Cisco Systems, Inc.

    This case study demonstrates how one telecom provider developed an intelligent visual data analysis engine that allowed them to identify voice and data threats in real time. This provided them with a holistic view of their network environment while bolstering overall data security by securing the voice network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.