ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Connected Car Security

    Sponsored by: Intertrust

    As connected cars grow in popularity due to their convenience, it’s important to note that the increasing number of smart features built into cars opens the network to serious vulnerabilities and threats. This white paper highlights the threats facing connected cars by examining common cyberattack patterns and how to protect against them.

  • Horace Mann Case Study

    Sponsored by: Siemplify

    In this case study, discover how Horace Mann, an insurance and retirementannuities organization, partnered with Siemplify to consolidate their separate operations teams into a single integrated operation center (IOC), enabling them to focus their resources towards ensuring employee retention and compliance regulations.

  • Top 10 Reasons to Consider Open Networking

    Sponsored by: Cumulus Networks

    Modern application demands continue to accelerate the transition from complex, proprietary, legacy networks to modern, open and disaggregated, web-scale architectures. In this white paper, explore 10 reasons you should consider moving to open networking.

  • What to Look for in a Zero Trust Solution in 2020

    Sponsored by: PortSys

    The zero-trust approach to access control isn’t a new concept. In fact, it’s been around for nearly 10 years. Although the concept is simple, organizations struggle to understand the most effective ways to implement it. This white paper explores the concept behind zero-trust, why it’s effective, and the primary ways it can be implemented.

  • What Has 2019 Meant for Wi-Fi and Cellular Networks?

    Sponsored by: 7SIGNAL

    Wi-Fi accessibility and services continue to boom as more people around the world are connected to the internet than ever before. Each year brings a new array of advances, issues and trends, and 2019 was no exception. In this white paper, look back at what happened in the world of cellular connectivity and Wi-Fi in 2019.

  • 2019 Mid-Year Global Overview of Live OTT Sports

    Sponsored by: Intertrust

    Until recently, live sports has been a major force in keeping many subscribers tethered to their pay-TV subscription. However, with recent improvements in live streaming technology, sports fans are moving from traditional to online viewing at a steady pace. In this report, learn how OTT sports are evolving around the world.

  • Reverse Engineering Still a Serious Problem in 2019

    Sponsored by: Intertrust

    While mobile applications and interconnected devices offer unmatched convenience, they also expose organizations and consumers to cybersecurity risks. This webinar breaks down common mobile application security threats and highlights real-life reverse engineering examples.

  • Choice Solutions MSSP Case Study

    Sponsored by: Siemplify

    In this case study, explore how Choice Solutions partnered with Siemplify to implement a security platform that enabled them to automate 98% of their tasks, allowing their team of analysts to focus their time and effort on more complex tasks by working within a single console.

  • The Importance of Cybersecurity for Executives

    Sponsored by: A-Lign

    As security threats become increasingly frequent, complex and disruptive, it’s critical for all leaders – not just the CIO, CTI and CISO – of an organization to play a role in ensuring security. In this white paper, explore the importance of cybersecurity for executives by looking at the common types of attacks and how to prevent them.

  • The Cybersecurity Guide: Defending from Threats and Preventing Hacks

    Sponsored by: A-Lign

    Organizations in every industry and at every size are vulnerable to data breaches or breach incidents. This cybersecurity guide exposes the threats that your organization could be vulnerable to and outlines threat prevention tactics in order to fortify your organization.

  • Five Major Bot Threats to Holiday E-commerce and How to Stop Them

    Sponsored by: PerimeterX

    With the holiday season approaching, it’s essential that online retail companies ensure they are prepared for the cybersecurity threats they face. This white paper highlights 5 major types of attacks companies need to be vigilant of and defensive capabilities for addressing these threats. Read on to make sure your organization is ready.

  • Preparing for a Data Breach: Not If, But When

    Sponsored by: A-Lign

    When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.

  • Avenue Stores Blocks ATO and Scraping with PerimeterX Bot Defender

    Sponsored by: PerimeterX

    In this case study, discover how Avenue Stores, a leader in plus size fashion, collaborated with PerimeterX to address malicious bot activity they were experiencing including ATO, web scraping, and card fraud.

  • Decluttering Your Security Environment

    Sponsored by: Mimecast

    While it’s natural to think that the solution to increased security risk is incorporating more technology, overcomplicating your environment with tools – and not the right personnel – can lead to increased risk. In this white paper, leverage expertise from a recent think tank for advice on how to address cybersecurity complexity.

  • How to Prevent Data Theft from Departing Employees

    Sponsored by: ActivTrak

    When it comes to cybersecurity, many organizations look to bolster their defenses against external threats, while overlooking some of the internal threats posed by departing employees. In this article, uncover the 5 steps your organization should consider for protection from internal data theft.

  • VMware NSX Cloud and AWS

    Sponsored by: VMware

    In this brief, learn how VMware NSX Cloud can help provide a common and consistent way to secure and manage cloud native workloads across the public cloud as well as on-premises workloads.

  • 5G, AI, Deepfakes and Beyond: The Future of IT and Security

    Sponsored by: Splunk

    The past few years has seen the emergence of several innovative technologies and increased sophistication of attacks – both of which shape the way business is done. In this report, explore the cybersecurity trends and threats to keep in mind for 2020 and beyond.

  • Protecting from Bot Attacks with PerimeterX

    Sponsored by: PerimeterX

    In this customer success story, Dan Davis, VP of Technology at Build.com, shares how PerimeterX Bot Defender protects their online storefront from advanced bot attacks in the wake of a series of cyberattacks.

  • Real-World Customers with VMware Network Automation

    Sponsored by: VMware

    Provisioning and management of most application infrastructure components is automated, but networking and security largely are not. In this white paper, explore 5 case studies of organizations that built networking and security automation into their development process with the help of VMware Network Automation.

  • How to Simplify Monitoring for Complex Network Devices

    Sponsored by: SolarWinds, Inc.

    If you’ve ever been tasked with monitoring and managing Palo Alto Networks firewalls, Cisco ASAs, F5 load balancers or Cisco Nexus devices, you understand this task can be very complex. Download this e-book to explore a number of ways to overcome common challenges of monitoring and managing these devices.

  • Modernize Your Network with Red Hat Ansible Automation Platform

    Sponsored by: Red Hat

    Network automation is critical for supporting the increasing application and workload needs of modern, digital business. It allows NetOps teams to rapidly configure, scale, secure, and integrate network infrastructure and application services. In this white paper, learn more about automation.

  • Splunk IT Security Predictions 2020

    Sponsored by: Splunk

    Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.

  • Automate Your Network with Red Hat

    Sponsored by: Red Hat

    With network automation, network operations teams can quickly respond to dynamic, ever-changing workload requirements for flexible capacity, application security, load balancing, and multi-cloud integrations. In this white paper, learn how to get started with common network automation tasks using Red Hat.

  • WAN Edge Infrastructure

    Sponsored by: Silver Peak

    WAN Edge Infrastructure now incorporates a broader set of network functions, including traditional routing, security, SD-WAN, and WAN optimization. In this Gartner Magic Quadrant, explore an evaluation of platforms available for the WAN edge and key insights into the Leaders, Challengers, Visionaries and Niche players.

  • 14 Zero Trust eXtended (ZTX) Ecosystem Providers

    Sponsored by: Okta

    Leverage this Forrester Wave report to uncover 14 significant Zero Trust eXtended (ZTX) ecosystem providers and how they stack up so you can make an informed vendor selection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.