ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software Research

  • Cisco Prime Network Control System 1.1

    Sponsored by: Cisco Systems, Inc.

    This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.

  • GFI WebMonitor 2012

    Sponsored by: GFI Software

    Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.

  • The Ten "Must Haves" for Secure Mobile Device Management

    Sponsored by: Zenprise

    Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them.

  • Securing Today’s Mobile Workforce

    Sponsored by: Juniper Networks, Inc.

    BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

  • Best practices for implementing 2048-bit SSL

    Sponsored by: Citrix

    Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.

  • Tackling Today’s Networking Challenges

    Sponsored by: HPE and Intel®

    This paper introduces the new concept of a multi-vendor network, the challenges surrounding this breed of network, trends within the industry, how to improve efficiency, and how to improve productivity when it comes to managing and infrastructure.

  • A Whirlwind Tour of Wireless Vulnerabilities

    Sponsored by: AirMagnet

    This white paper discusses the steps you must take to ensure that your wireless network is security and how to guard against vulnerabilities.

  • Comprehensive Security for Today's Data Center

    Sponsored by: IBM and Juniper

    This white paper details conprehensive security for today's changing data centers including virtualized network and cloud computing.

  • The Evolving Threat Landscape

    Sponsored by: Juniper Networks, Inc.

    This paper surveys emerging threats, profiles theirhighly organized perpetrators, and reviews some of the revolutionary technologies that make these attacks so persistent and effective.

  • Success Story: Astaro Gets the Checkered Flag at F1 Boston

    Sponsored by: Astaro

    New England’s premier high performance kart racing venue, F1 Boston, faced issues with its current firewall protection solution. View this case study to learn how switching to Astaro Security Gateway met F1 Boston’s security needs, while being easy to set up and manage at a more affordable cost.

  • Gunner Peterson's Security Gateway Buyer’s Guide

    Sponsored by: Intel

    Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.

  • Security Gateway Buyer's Guide

    Sponsored by: Intel

    If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity.

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: BlackBerry

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • Sentinel Log Manager Review

    Sponsored by: Novell, Inc.

    This paper is a review of the stand-alone Sentinel Log Manager and how it stands up to keyconcerns that survey respondents raised about log managers, including collection, storage andsearching/reporting capabilities.

  • Detect and Survive

    Sponsored by: Guidance Software, Inc.

    This white paper discusses why the need to forensically examine security threats is an increasingly vital tool for modern companies. It also examines leading providers of this technology, including EnCase Cybersecurity from Guidance Software.

  • AVG Anti-Virus Network Edition Delivers Rock Solid, Easy to Manage Protection for US Construction Firm

    Sponsored by: AVG Technologies USA, Inc.

    R&O Construction was having difficulty managing their mostly mobile network. With so many laptops and mobile devices in use remotely, the company was seeing an increase in security threats infecting the IT infrastructure. Their existing solution was overtaxing both system and human resources. Read on to learn how they overcame these challenges.

  • How Malware Can Sneak Into Your Company Networks and How to Deal With It

    Sponsored by: AVG Technologies USA, Inc.

    Taking your network offline might sound like the only effective way to keep viruses and other so-called malware out of your business. But even without the internet, there are still plenty of ways for malicious code to worm its way onto your network. Read this quick white paper for an overview of the main threats and how to protect against them.

  • Fast-Growing Municipality in Southeast USA Secures IT Operations and Services with AVG Anti-Virus Network Edition

    Sponsored by: AVG Technologies USA, Inc.

    The city of Brentwood’s IT environment is made up of 450 computers and counting. Increased population growth brings greater IT infrastructure needs. Brentwood’s old security provider couldn’t keep up. Read this brief case study to find out how Brentwood managed to meet their growing IT security needs.

  • 7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction

    Sponsored by: Qualys, Inc.

    Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?

  • Guide: Patch Authority Ultimate

    Sponsored by: ScriptLogic Corporation

    With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.

  • When Less Is More: Why Small Companies Should Think Outside the (Red/ Yellow) Box for Protecting Endpoints

    Sponsored by: Sunbelt Software

    Endpoint security issues simply can't be ignored, regardless of the size of the organization. This paper will discuss how internet threats and vulnerabilities affect us all and what criteria businesses should use in order to pick out a proper endpoint security solution.

  • Cisco Security Solutions - A Reference Guide

    Sponsored by: Cisco Systems, Inc.

    This reference guide shows why security matters now more than ever. A strategic security solution empowers organizations to maintain their reputation, meet regulatory compliance standards, protect business information, and optimize business operations. Read on and discover how Cisco can help you meet those objectives.

  • The Value of Integrated Security

    Sponsored by: Cisco Systems, Inc.

    Security breaches can attack a company from a wide range of sources, including the company's own networked PCs and servers. This paper explains how Cisco is merging innovative network security technology with more than 20 years of routing expertise to redefine network security and provide customers with end-to-end network protection.

  • Successful Mobile Deployments Require Robust Security

    Sponsored by: Lopez Research

    Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.

  • Application Discovery Tool

    Sponsored by: Sophos

    With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.