ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software Research

  • The 2019 Security Strategy

    Sponsored by: Cloudflare

    How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.

  • Securing Applications in the Cloud

    Sponsored by: Cloudflare

    In this white paper, explore a network security tool designed to help you remain secure and 'always-on' by providing intelligent security at scale, and layered defenses to protect against DDoS, data theft and malicious bots.

  • 11 Limitations of Network-Centric Security In The Cloud

    Sponsored by: Lacework

    Traditional security solutions were originally at the perimeter, which was primarily defined by the network. Modern threats targeting public clouds demand a different level of insight and action. Read this report to learn how you can modernize your network security.

  • Helping Noble Group to Secure its Global Network

    Sponsored by: BT

    The Noble Group, a Hong Kong-based global banking company needed to maintain their highest standards of network security. Since their whole business revolved around real-time, online global trading, it was crucial to have a secure and dependable network. Read on to learn about the security services they implemented.

  • Global DNS Defense Report

    Sponsored by: Farsight Security

    Explore this report to learn about DNS protection technology adoption trends and find out how you can bolster your network's defense against pervasive threats like phishing attacks.

  • Network Security Tools for GDPR

    Sponsored by: Aruba Networks

    From data protection to network access security control, learn what cybersecurity tools are best positioned to help you anticipate, detect, and eliminate threats so that you can meet GDPR guidelines, even in complex, multi-vendor environments.

  • Next generation network security

    Sponsored by: ComputerWeekly.com

    In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

  • Focus: Network security

    Sponsored by: ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • How SD-WAN is Changing Network Security

    Sponsored by: Cato Networks

    In this expert e-guide, we explore how network security has to change in order to keep up with the evolution of SD-WAN. Find out how some vendors are differentiating their SD-WAN platforms with native security, and read up on how SD-WAN is reshaping the network connectivity landscape.

  • The Evolution of ADC

    Sponsored by: Citrix

    Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.

  • How the Basics of Network Security Have Evolved

    Sponsored by: Fortinet, Inc.

    In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

  • The Touch-Free Future and Current Adoption Trends of SDN

    Sponsored by: Juniper Networks, Inc.

    There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise.

  • From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts

    Sponsored by: HP

    In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • Advanced Attacks are Catching On - Here's What you can Do

    Sponsored by: Kaspersky Lab

    In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.

  • Bridge the Network Security Gap in IP Multifunction Machines

    Sponsored by: HP

    In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: Synopsys

    This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.

  • 6 Crucial Incident Response Policy Mistakes to Avoid

    Sponsored by: Delta Risk

    Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.

  • Software-Defined Network Security: A 'No-Touch' Approach

    Sponsored by: VMware

    Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.

  • Microsegmentation Strategies for Smarter Security

    Sponsored by: VMware

    In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.

  • Is UTM Ready for the Big Leagues?

    Sponsored by: SearchSecurity.com

    This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.

  • Is UTM Ready for the Big Leagues?

    Sponsored by: SearchSecurity.com

    This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.

  • Threat Intelligence Services: An Introduction

    Sponsored by: Cisco Umbrella

    Improve your enterprise security with threat intelligence services, as presented in this e-guide, and learn what you can expect when you hire an incident response provider to handle your ongoing crisis.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.