ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Salesforce Uses Bug Bounties to Protect Customer Data

    Sponsored by: HackerOne

    Salesforce's Bug Bounty program is one of their many efforts that contributes to the security of their products, and therefore, their customers. In this case study, learn how Salesforce has worked with HackerOne to successfully implement their bug bounty program. Also, explore the benefits Salesforce has seen.

  • Securing Multi-Cloud Environments with SD-WAN

    Sponsored by: Cisco Systems, Inc.

    As more organizations are adopting a multi-cloud architecture, IT teams are faced with the challenge of delivering a high quality user experience while maintaining security. In this white paper, learn how SD-WAN can combat these challenges by delivering secure, reliable connectivity across a multitude of cloud platforms, including multi-cloud.

  • Enterprise SD-WAN in the Real World

    Sponsored by: Forcepoint

    While many companies identify a need to evolve to SD-WAN, they are not always convinced SD-WAN can deliver the necessary enterprise capabilities. In this webcast, learn how Link-Connect implemented Forcepoint NGFWs to deliver enterprise-class SD-WAN to manage more than 400 sites from a single management console.

  • Explore Enterprise Network Firewalls

    Sponsored by: Forcepoint

    There are many options for Enterprise Network Firewalls, which all provide a variety of protection features. Although they all offer a standard set of features, there are often signification differences in each option. In this Gartner Magic Quadrant, explore the strengths and cautions of key vendors in the Enterprise Network Firewalls market.

  • Secure Your Office 365 Environment With Forcepoint

    Sponsored by: Forcepoint

    Driving Office 365 adoption is an important goal. Yet few organizations have fully migrated due to concerns around security, compliance, and poor user experience. In this webcast, learn how Forcepoint's Office 365 platform can help you move past these barriers by providing the confidence you need to fully adopt the suite.

  • Phishing in the Age of SaaS

    Sponsored by: SonicWall

    Phishing attacks have become the primary hacking method used against organizations. While the roots of the attack trace back to the beginning of email adoption, the proliferation of SaaS has led to a resurgence in this hacking method. In this white paper, learn how SonicWall Cloud App Security can help you defend against SaaS phishing attacks.

  • A Massively Scalable Approach to Network Security

    Sponsored by: SonicWall

    Learn about a new approach securing your network in this white paper. It explores a network-based model for scaling a next-generation firewall (NGFW) that can help provide better performance, increase resiliency and lower TCO.

  • Quantifying the Operational and Security Results of Switching to Forcepoint NGFW

    Sponsored by: Forcepoint

    The distributed nature of many organizations and the changing nature and scale of threats are creating new pressures related to network security. In this IDC study, learn how Forcepoint Next Generation Firewall can serve as a core component of organizations' efforts to protect their networks against common threats.

  • Restricting Device Communications to Select Destinations

    Sponsored by: Aeris

    Gaining security for your IoT devices is a critical step for any deployment, large or small. Keeping your data secure can be business critical. The key to all of this is the ability to restrict device communications only to select web destinations of your choosing. Read on to learn how Aeris ConnectionLock makes this possible.

  • Modernize Your Data Protection

    Sponsored by: Forcepoint

    Navigating your data protection journey can be complex. In this webcast, Angelica Torres-Corral, Senior Product Marketing Manager at Forcepoint gives insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) software and adopting a more proactive security strategy.

  • Executive Brief: Securing the Next Wave of Wireless

    Sponsored by: SonicWall

    Learn about securing the next wave of wireless networks in this brief white paper.

  • Is a Browser Isolation Solution the New "Sandbox" for Security?

    Sponsored by: Menlo Security

    Protecting organizations from web threats has typically been done with a proxy or DNS solution but a new approach has emerged. In this webcast, learn more why remote browser isolation technology adoption is on the rise, 3 critical requirements when selecting a practical isolation solution, and more.

  • Apcela Improves Office 365 Performance by 60%

    Sponsored by: Apcela

    While it's true that digital transformation can lead to productivity growth, the key to unlocking that growth is not purely about the cloud-based applications. Just as important as the applications is the network performance. In this product brief, explore how Apcela's Office 365 Accelerator can improve your network performance.

  • Beyond Application Performance

    Sponsored by: Apcela

    Apcela strives to enable enterprises to easily manage application performance in hybrid IT environments. The platform is designed to securely accelerate applications and data between legacy enterprise data centers and the cloud. In this solution brief, explore key benefits that Apecela's Office 365 Accelerator can bring to your business.

  • Application-Centric Security

    Sponsored by: Nutanix

    Relying on antiquated methods of protecting IT is no longer feasible. It's time to consider a new application-centric approach that delivers the protection you need with more agility, more flexibility, and above all, better security. Download this e-book to learn how application-centric security can benefit your organization today.

  • Networks Get Strategic with SD-WAN

    Sponsored by: SonicWall

    A critical element of SD-WAN solutions today is an integrated security approach. Learn about 1 SD-WAN vendor and their approach to security in this white paper.

  • Who needs malware? How Adversaries use Fireless Attacks to Evade your Security

    Sponsored by: CrowdStrike

    According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.

  • Cyber Intrusion Services

    Sponsored by: CrowdStrike

    In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.

  • Advanced Threat Protection Beyond the AV

    Sponsored by: Cynet

    While large enterprises can cover attack surfaces with a SIEM or employ a staff of skilled SOC analysts, mid-sized organizations have to address similar cyber-risks with significantly less resources. In this white paper, discover strengths and weaknesses of two Advanced Threat Protection approaches: Endpoint Protection and Network Analytics.

  • AV Replacement Guide

    Sponsored by: CrowdStrike

    Antivirus is virtually universal, so why are so many attacks succeeding? Attackers expect their targets to be running some form of protection and have adapted their tools, techniques and procedures to evade detection. In this white paper, learn the most important elements to consider when replacing an antivirus or endpoint protection solution.

  • Transforming Cloud Connectivity & Security in Distributed Networks

    Sponsored by: Forcepoint

    In this webcast, learn how Forcepoint branch security can enable highly distributed organizations to improve productivity, reduce costs, better manage risk, and streamline compliance.

  • 5 Best Practices for Managing your Network Security in the Age of Digital Transformation

    Sponsored by: Verizon

    Digital transformation is impacting every industry and it's making network security more important than ever. In this blog, explore 5 things you should consider for your security strategy as you embrace digital transformation, so you can navigate the minefield of evolving threats.

  • 5 Reasons Why Your Business Needs Software-Defined Networking

    Sponsored by: Verizon

    There has recently been a rapid take-up of software-defined networking (SDN) – the automation and virtualization of network operations. In this blog, explore 5 common factors driving organizations to implement SDN.

  • Protecting the Unprotectable with Next Generation Authentication

    Sponsored by: Silverfort

    Not trusting anyone by default, even those already inside the network perimeter, has to be the new reality. The security model of zero trust. In this webinar, learn why traditional MFA won't cope with zero trust requirements, why passwords are no longer a reliable factor of authentication, and more.

  • TeamViewer Tensor Integration Webinar

    Sponsored by: TeamViewer

    TeamViewer Tensor has changed the paradigm of remote connectivity by allowing you to assign appropriate user access rights to employees so they can get full desktop access to their work computers and network servers. In this webcast, explore key benefits of TeamViewer Tensor.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.