ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Evaluating Vulnerability Risk Management Providers

    Sponsored by: Rapid7

    As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.

  • Network Security for a New Era

    Sponsored by: TechData - HPE

    Mobile devices and smart objects are connecting to the same school networks, but they have very different security needs. Read this report for how K-12 leaders can manage the new security challenges of mobile devices and smart objects.

  • Building Networks with Security at Their Core

    Sponsored by: 128 Technology

    Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.

  • Network Security – A Patchwork Quilt Bursting at the Seams

    Sponsored by: PortSys

    In this article, learn about a more efficient way for an organization to manage their network security from top to bottom.

  • What Really Happened with the Capital One Attack and How to Prevent it

    Sponsored by: Aporeto

    The Capital One data breach on July 30, 2019 was due to the exploitation of a well-known class of security vulnerabilities that are based on security relying on credentials. In this video, listen as Aporeto CTO, Dimitri Stiliadis discusses the root cause and how to prevent a breach with Aporeto.

  • Los Angeles USD Gets a ClearPass for Securing District-Wide Wi-Fi

    Sponsored by: TechData - HPE

    Dive into this case study to learn how the second largest school district in the U.S. utilized Aruba solutions to help unify, manage and secure its multi-vendor Wi-Fi infrastructure.

  • GandCrab Ransomware Analysis Report

    Sponsored by: Versa Networks

    A recent ransomware which has become viral since January 2018 is named GandCrab. The developers have been continuously updating and releasing improved versions, with approximately 6 variants observed to date. This white paper will take a quick look into these variants and provide insightful into how they are impacting users.

  • The Benefits of SD-WAN with Integrated Branch Security

    Sponsored by: Versa Networks

    In this white paper, learn about the challenges of branch networking for enterprises and services providers, and discover the benefits of using SD-WAN with integrated branch security.

  • Secure Enterprise SD-WAN for Dummies

    Sponsored by: Forcepoint

    In this For Dummies e-book, find out how to meet the demands for fast, reliable, and dispersed network connectivity by building a secure enterprise SD-WAN strategy.

  • Pogo Paradox: Is Your Infrastructure Your Worst Enemy?

    Sponsored by: PortSys

    In today’s modern hybrid enterprise, where users access multiple apps – both local and cloud – from anywhere in the world through multiple devices, credentials alone just don’t make the grade anymore. In this blog, learn more about the shortcomings of today’s complex maze of security solutions and how a zero-trust philosophy can help.

  • x86 to LinuxONE Redbook

    Sponsored by: IBM

    LinuxONE is a portfolio of hardware, software, and solutions for an enterprise-grade Linux environment. It has been designed to run more transactions faster and with more security and reliability specifically for the open community. In this white paper, learn about the process of migrating from x86 to LinuxONE.

  • Patch Management: Your Biggest Ally in the War Against Cybercrime

    Sponsored by: Panda Security

    The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.

  • Meeting the Challenge of Cloud-Native Security Threats

    Sponsored by: Amazon Web Services

    Learn how your network and security operations teams can gain real-time situational awareness of all users, devices, and traffic on the network, in the data center and across your AWS environment, so you can quickly and effectively respond to threats.

  • Securing Your Modern Network with AWS and Cisco Stealthwatch Cloud

    Sponsored by: Amazon Web Services

    The security of the network, which was always important to the network admin, has become a top priority. However, you can’t fix what you can’t see. In this white paper learn how Stealthwatch Cloud can help you to see your network activity, identify the signs of potential threats, and more.

  • How Has IoT Changed Complex Wireless Network Management?

    Sponsored by: 7SIGNAL

    In this white paper, explore how IoT has changed complex wireless network management.

  • 4 Strategies for Safeguarding Security and User Experience

    Sponsored by: Ixia - Keysight

    Edge computing is emerging as a viable way to reduce latency and improve performance. But that brings about a scary question: Is edge computing threatening user experience and making your network less secure? Find out in this white paper, and explore 4 tips for maintaining security and a good user experience.

  • 6 Steps You Can Take to Optimize Defensive Security

    Sponsored by: Ixia - Keysight

    Bad actors have access to low cost, high impact security attack tools. You need to be able to play both defense and offense to keep up the defenses against them. Learn how Ixia network visibility can help give you an advantage against hackers, helping you optimize your network monitoring architecture while strengthening network security.

  • SOCs: Everything You Need to Know

    Sponsored by: TechTarget

    How do you know if an SOC is right for your organization? Provide your insight in our Market Research Program today, and upon completion, receive a complimentary copy of our expert guide to help you understand the features you should look for in an SOC.

  • Leading Industrial Cybersecurity Company

    Sponsored by: Claroty

    In this solution brief, learn how with Claroty, your cybersecurity and engineering teams are armed with a solution that gives them visibility and tells them exactly what is happening across their complex industrial network.

  • It May Be Time To Rethink RDP

    Sponsored by: PortSys

    RDP, Microsoft’s widely used remote access tool, continues to be a prime target of malicious cyber criminals. The problem is only getting worse as hackers broaden their reach through highly advanced automated attacks. In this article, learn why a zero trust solution can help strengthen and simplify your overall access infrastructure.

  • Microsegmentation Security: In the Network and the Cloud

    Sponsored by: Illumio

    As network administrators move beyond traditional network segmentation, creating a good network microsegmentation strategy across the enterprise is essential. But what exactly is microsegmentation? Learn about different microsegmentation strategies such as zero-trust and cloud microsegmentation and how they can keep your enterprise secure.

  • Unified Threat Management: Locking Your Network Down

    Sponsored by: Comcast Business

    While there is no end-to-end "silver bullet" in terms of security solutions, Unified Threat Management (UTM) offers a suite of technologies that can make it a foundational part your network security. In this webinar from Comcast Business, discover UTM capabilities, functions, and benefits.

  • Enel Case Study: Securing Global Power Generation Network

    Sponsored by: Nozomi Networks

    Electric energy operators are working to increase the reliability and cyber resiliency of their systems. This includes Enel, a global power company. In this case study, learn how Enel was able to monitor, troubleshoot, and protect its industrial control network from a central location with the help of Nozomi Networks.

  • Security Automation 101: Change Management and the Complexity Gap

    Sponsored by: FireMon

    Download this e-book to see how the complexity gap is impacting organizations and the pivotal role network security policy automation plays in helping organizations reduce risk and enhance their overall security posture.

  • Evaluation Criteria for Choosing an ICS Cybersecurity Monitoring System

    Sponsored by: Claroty

    A rapidly changing threat landscape, combined with convergence between traditional IT and industrial control networks is having a dramatic impact on the risk to industrial control systems. In this white paper, explore key criteria leading organizations are using to evaluate and select an appropriate monitoring system for industrial networks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.