Research Library

Powered by

Network Security Research

  • The Network for the Digital Business Starts with the Secure Access Service Edge (SASE)

    Sponsored by: Cato Networks

    Networking and security are slowing down businesses as silos, built decades ago, are stretched and patched to accommodate emerging business requirements. In this white paper, learn how networking and security can become part of the IT platform for the digital business with a single cloud-based service: Secure Access Service Edge (SASE).

  • Wireless Competitive Comparison

    Sponsored by: Cisco Systems, Inc.

    In this resource, explore a wireless competitive comparison of Cisco, HPE and Huawei as they are evaluated on several criteria.

  • Accedian Skylight’s Metadata Helps Drives Complete Visibility

    Sponsored by: Accedian

    Full visibility is important. But, sometimes full visibility can’t be achieved because of the complexity, a lack of access, or excessive costs. In this short video, learn about Accedian Skylight which captures 100% of the network traffic to help provide your organization with complete visibility.

  • The Hard Truth About Winning Against Cyber Threats

    Sponsored by: Dell SecureWorks

    When developing security strategies, today’s organizations make the mistake of being overly reliant on specific tools and technologies rather than focusing on hygiene and culture. This white paper overviews key characteristics of a hygienic security approach, and highlights 5 focus areas for developing a security strategy.

  • Smooth the Transition to the Cloud with Radware’s Secure ADC Solutions

    Sponsored by: Radware

    Many enterprises are transitioning to the cloud. As a result, their focus shifts from infrastructure-centric environments to application-centric solutions. This creates the unique challenge of how to make advanced services, such as application delivery and security simpler to consume and maintain. In this brief, learn how Radware’s ADC can help.

  • MicroScope – April 2020: Seeking sustainability in the channel

    Sponsored by: MicroScope

    In this issue, we look at sustainability in the channel, with customers increasingly wanting to know that their reseller has a handle on their carbon footprint. Also, read about SCC's insight on mobile working and workforce security, and take a closer look at Riverbed's return to its roots

  • Mobile Access Optimization and Security for the Cloud Era

    Sponsored by: Cato Networks

    Mobile and the cloud are the new normal for today's business. But traditional access solutions are poor choices when mobile users "live" in AWS, Office 365, and the rest of the cloud. This whitepaper will explain the pros and cons of the three ways mobile users can securely access the cloud: direct access, legacy VPN, and cloud SD-WAN.

  • What Wipros Intent-Based Networking Means for Your Organization

    Sponsored by: Wipro

    In this short video, learn about Wipro's IBN, powered by Cisco DNA, and how it can help align your network with the business intent of sales executives.

  • Top 3 Security Risks for your SD-WAN Implementation

    Sponsored by: BT

    The visibility, control and agility that an SD-WAN can deliver to a global organization makes it very attractive, but it can come with significantly higher risks. In this webcast, Kevin Brown, Adrian Comley and Peter Sader discuss the top 3 security risks you need to consider to make sure your SD-WAN implementation is secure.

  • A Unified Wired and Wireless Access Edge Is Business Critical

    Sponsored by: Cisco

    A critical step in the journey to becoming a digital business is becoming an agile organization. The challenge is that an organization can only be as agile as its least agile IT component, which today is the network—particularly the access edge. In this research report, learn how organizations can change this by implementing a unified edge.

  • Cisco Digital Network Architecture

    Sponsored by: Cisco Systems, Inc.

    In this resource, learn how Cisco Digital Network Architecture (Cisco DNA), built on intent-based networking principles, helps you build a new network and deliver better experiences more securely, so you can focus on your business, not on your network.

  • Intent-Based Networking Explained

    Sponsored by: Cisco Systems, Inc.

    In this short video, explore the basics of intent-based networking (IBN) and how to benefit from IBN solutions.

  • Intent-Based Networking at a Glance

    Sponsored by: Cisco Systems, Inc.

    IT professionals need to bridge the gap between what your business needs and what your network delivers in terms of scalability, operational effectiveness, and security. In this brief, learn how your IT teams can meet these challenges by adopting an intent-based approach across each network domain.

  • Definitive Guide to Internet Isolation

    Sponsored by: Menlo Security

    In this e-book, learn about Internet isolation which delivers a Zero Trust Internet by separating an enterprise network from the public web, while still allowing users to access the Internet seamlessly.

  • Avoiding Top 3 Security Challenges of Digital Transformation

    Sponsored by: Menlo Security

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.

  • InfoSec Pros Should Do These 8 Things During the Coronavirus Outbreak

    Sponsored by: CI Security

    With coronavirus, more organizations are changing the way they operate. More people are working remotely than ever before, which leads to new and interesting challenges for information security professionals. Download this white paper for 8 steps InfoSec pros should take now.

  • Research Reveals: Network Security is Converging in the Cloud

    Sponsored by: Cisco Umbrella

    Network security is no longer confined to the data center. Its new address is in the cloud. In this webcast, learn why Gartner is introducing a new market category, the secure access service edge (SASE), which converges security services in the cloud.

  • The Quantifiable Business Value of Advanced Networking

    Sponsored by: Cisco Systems, Inc.

    Successful IT organizations are embracing advanced networking capabilities across multiple domains of the network. Download this IDC infobrief to explore the quantifiable results some organizations have realized as a result of embracing advanced networking technologies.

  • Microsoft And Morphisec: How to Prevent and Expose Unknown Threats

    Sponsored by: Morphisec, Inc.

    This webinar highlights an emerging threat plaguing today’s organizations at an increasing rate, unknown threats. Join industry experts at Microsoft and Morphisec as they discuss the efficacy of these threats and highlight how to detect and prevent them. Watch the full webinar now.

  • The Future of Network Security Is in the Cloud

    Sponsored by: Menlo Security

    Network and network security architectures were designed for an era that is waning, and they are unable to effectively serve the dynamic secure access requirements of digital business. In this Gartner report, learn why security and risk management leaders need a converged cloud-delivered secure access service edge to address this shift.

  • When the Data Center is No Longer the Center of Data

    Sponsored by: Apcela

    Some enterprises have closed down their data centers, but it doesn’t seem likely that another 7 out of 10 enterprise data centers will go offline in just five years. In this brief, learn why a new paradigm is needed to extend the WAN beyond the data center to the multi- and hybrid cloud environment in which the modern enterprise operates.

  • Hyperautomated AI-based Security vs VMware NSX

    Sponsored by: ShieldX

    In this sheet, discover how to secure the modern, multi-cloud data center with hyperautomated AI-based security and compare it to a different network security offering in the market.

  • Managing Security Risk and Compliance in a Challenging Landscape

    Sponsored by: Dell

    How can you keep your business secure that amid the proliferation of devices and data? It starts with a trusted technology partner. Download this research report to learn why a trusted partner is key to a successful security strategy.

  • How Can Trend Micro XDR Solve Your Detection and Response Challenges

    Sponsored by: Trend Micro

    In the last 5 years, there’s been a 67% increase in security breaches. Disconnected security layers make analyzing and investigating threats a challenge. Additionally, slow and inadequate response increases the impact of the attack. In this infographic, learn how Trend Micro XDR can help solve your detection and response challenges.

  • What Makes A Standalone IPS So Effective?

    Sponsored by: Trend Micro

    In this white paper, explore the guiding principles security researchers need to follow when designing and developing effective vulnerability filters, with examples of how these filters can be used by an IPS to detect and block the latest threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.