ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Symantec Web Security Service: Advanced Cloud-Delivered Network Security for the Cloud Generation

    Sponsored by: Symantec

    Today's enterprise-security reality: Devices, data, and applications are outside of your physical control—and all of it must be managed and secured. In this guide, learn about advanced security tools that can help you overcome the security challenges of the cloud generation.

  • Are Your Communications At Risk?

    Sponsored by: Verizon

    Unsecured mobile devices and apps that connect to your network can leave communications, passwords and other sensitive data open to theft. Find out how companies are fighting back by adopting cloud-based communications platforms with built-in end-to-end security.

  • Versa FlexVNF: Software-Defined Wide Area Network Test Report

    Sponsored by: Versa Networks

    According to NSS Labs, 3 of the most common reasons why enterprises deploy SD-WAN are to implement technologies that promise to improve manageability, cost, performance and security. In this report, find out how Versa Networks FlexVNF performed when tested by NSS on specific use cases.

  • 6 Trends to Know for Better Business Communications

    Sponsored by: Verizon

    Communication is the backbone of every business. When you effectively communicate with customers and employees, everything else falls into place. In this ebook, discover the 6 trends you should know for better business communications.

  • The Perimeter is Dead. Long Live the Perimeter

    Sponsored by: Symantec

    The traditional network perimeter is vanishing and so is the security built into that perimeter. In order to stay secure in today's cloud generation workforce, organizations need a better way to extend their security controls while still supporting anytime and anywhere access. In this infographic, learn 5 tips for securing your network.

  • Securing Cloud Transformation with a Zero Trust Approach

    Sponsored by: Zscaler

    Cybersecurity wasn't designed for the cloud, and even though traditional network security solutions are being retrofitted for "cloud" usage, security is getting in the way of the adoption of zero trust strategies. In this white paper, learn why transforming to the cloud calls for zero trust network access (ZTNA) services.

  • The SIEM Buyer's Guide for 2020

    Sponsored by: Splunk

    The importance of a SIEM solution in today's enterprise is magnified by the growing sophistication of attacks and the use of cloud services which only increases the attack surface. In this buyer's guide, learn everything you need to know about a SIEM including what it is, its evolution and how to determine if it is right for your organization.

  • Q2, 2019 Cyberthreats & Trends Report

    Sponsored by: Neustar

    While DDoS attacks have long been considered unsophisticated threats that are designed to block network pipes to the targets, these incursions have become much more strategic. In this report, learn how to defend against and prepare for these kinds of small sophisticated threats.

  • How to Keep up with the Shifting Landscape of Password Attacks

    Sponsored by: Zoho

    Hackers are evolving, and apart from implementing technology to help avoid cyberthreats, personal awareness plays a big role in defending against the mechanisms cybercriminals use to steal credentials. In this white paper, explore password theft methods used by hackers, and learn how simple tweaks can reduce the risk of a password compromise.

  • Shortcomings of Traditional Security and Digital OT

    Sponsored by: Fortinet, Inc.

    The rapid adoption of digital tools and services has caused internet-connected information technology (IT) networks to increasingly intersect with previously isolated operations technology (OT) networks. Find out what this means for your security posture in this white paper.

  • Discover How to Overcome Network Complexity and Enable Digital Transformation

    Sponsored by: Verizon

    In this IDG QuickPulse white paper, discover how to overcome network complexity and enable digital transformation.

  • Networks in Transition: How Leaders are Addressing Multifaceted Challenges

    Sponsored by: Verizon

    How are leaders addressing multifaceted challenges during digital transformation efforts around security, mobility, cloud, customer experience, and application needs? Dive into this Market Pulse white paper to find out.

  • Fortinet 2019 Operational Technology Security Trends Report

    Sponsored by: Fortinet, Inc.

    Fortinet's 2019 OT Security Trends Report analyzes data from FortiGuard Labs to glean insights about the state of security for supervisory control and data acquisition (SCADA) and other industrial control systems (ICS). Download the report to discover key findings.

  • Penn State Smart Buildings 2.0

    Sponsored by: Tempered Networks

    In this Penn State case study, find out how System Design Specialist Tom Walker and his team securely connected and isolated their building controls across 640 buildings in record time.

  • Fortinet SD-Branch Secures the Network Edge at the Branch

    Sponsored by: Fortinet, Inc.

    In this white paper, discover how Fortinet SD-Branch consolidates the network access layer within a secure platform that provides visibility and security to a network and all devices connected.

  • Securing Industrial Control Systems With Fortinet

    Sponsored by: Fortinet, Inc.

    In recent years, the industrial control systems (ICS) upon which much of our critical infrastructure and manufacturing industry depends, have come under increasingly frequent and sophisticated cyberattacks. In this white paper, learn how, in spite of these challenges, Fortinet's solutions can help to ensure the safety and reliability of ICS.

  • Consolidating Networking and Security Functions Can Reduce Branch Vulnerability

    Sponsored by: Fortinet, Inc.

    In this white paper, learn how a platform that consolidates networking and security capabilities can help network engineering and operations leaders simplify infrastructure while providing better security and productivity.

  • State of Operational Technology and Cybersecurity Report

    Sponsored by: Fortinet, Inc.

    Recently, IT-based technologies have been integrated with operational technology networks to create new efficiencies and competitive advantages. However, this increases the digital attack surface and the risk of intrusion. In this research report, explore key findings from a survey of plant operations and manufacturing leaders.

  • Smart Buildings 2.0 Cruise

    Sponsored by: Tempered Networks

    In this case study, discover how one of the world's largest cruise lines connected and secured its entire fleet's maritime systems quickly and easily without dry dock downtime and loss of revenue.

  • OT Network Security Starts with Visibility

    Sponsored by: Fortinet, Inc.

    Operational technology (OT) and information technology (IT) have traditionally been kept separate in most cases, but now they are being integrated—which is causing a lot of problems for security. In this white paper, find out how you can protect your IT-OT environment while getting the visibility, control, and situational awareness you need.

  • A Buying Guide for Next-Gen Remote Access

    Sponsored by: Citrix

    In this e-book, discover Citrix Gateway, a next-generation SSL VPN, and the ways it helps enterprise IT better address remote access challenges.

  • Zero Trust Access Video

    Sponsored by: PortSys

    Total Access Control's (TAC) Zero Trust approach to access redefines the way users get access to information across your enterprise. In this video, learn how it allows you to secure your infrastructure, provide the segmentation you need to protect your resources and dramatically simplifies access for your end users.

  • ZS Solves Office 365 Security Issue with PortSys TAC

    Sponsored by: PortSys

    ZS, a consulting and professional services firm, faced a challenge when making the transition to Microsoft Office 365. In order to solve their problem, ZS decided to implement PortSys' Zero Trust Access Management product, Total Access Control (TAC). In this case study, explore the benefits that ZS saw after implementing TAC.

  • How to Simplify Network Operations Complexity

    Sponsored by: Fortinet, Inc.

    By rapidly adopting new digital technologies, network infrastructures have become increasingly complex and fragmented. To help mitigate this perfect storm of operational complexity, enterprises should embrace the greater simplicity of an integrated architecture. Find out how you can get started with that in this white paper.

  • 5 Steps to SDN Success with Vodafone Ready Network

    Sponsored by: Vodafone

    In this infographic, discover the 5 steps on how to be successful with SDN and Vodafone Ready Network.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.