ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • The Evolution of ADC

    Sponsored by: Citrix

    Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.

  • Cyber-Risk Strategies and Models for a Post-Perimeter Age

    Sponsored by: TechTarget Security

    In our expert handbook, managing editor Brenda Horrigan and Nemertes Research president Johna Till Johnson explain how to implement a zero-trust approach to cybersecurity.

  • What SD-WAN Means for Today's Businesses

    Sponsored by: Verizon

    Learn from Lee Doyle, Principal Analyst at Doyle Research, about how a mature SD-WAN market can bring distributed networks up to speed with simplicity and automation. Then, find out how to exactly tailor SD-WAN for your business needs.

  • Network Evolution: Network Pros Get Smart(er) with Analytics

    Sponsored by: TechTarget Networking

    In this issue of Network Evolution e-zine, learn why enterprises are turning to big data network analytics tools that leverage machine learning and AI to create meaningful, actionable information that can help enhance network performance.

  • Optimizing Endpoint Security for the Enterprise

    Sponsored by: ConvergeOne

    Given the diversity of devices, combined with the wide assortment of users that now connect to an enterprise network, securing endpoints is extremely challenging. Explore this expert e-guide to gain insight into optimizing endpoint security strategies to protect networks and data from attacks.

  • The New Age of Microsegmentation

    Sponsored by: Illumio

    Why has a microsegmentation security strategy become so popular? In this e-guide, experts Andrew Froehlich and Dave Shackleford discuss the benefits and drawbacks of microsegmentation and how to get the most of your security approach.

  • Endpoint Protection & Device Management

    Sponsored by: Seqrite

    The endpoint security market is expected to surge to a $27 billion valuation by 2024, according to Grand View Research Inc. Inside, experts David Geer and Jack Gold dive into endpoint security head-first and reveal the latest protection strategies against exploits on devices.

  • How to Successfully Move your UCC Strategy to the Cloud

    Sponsored by: Cisco

    This e-guide explores unified communication and collaboration (UCC) challenges IT networking pros need to overcome, as well as how to craft cloud UC strategies to aid in overcoming these challenges.

  • Defense-In-Depth Security: Key to Keeping IT Safe

    Sponsored by: TechTarget Security

    The enterprise perimeter's demise is in part due to BYOD. Leverage this expert handbook to uncover an effective approach to constructing your IT security "fortress" and replacing the outdated idea of a security perimeter.

  • How SMBs are Changing their Security Tactics

    Sponsored by: Booz Allen Hamilton

    Security has changed dramatically over the decades. In this e-guide, learn why firms look to security analytics to keep pace with cyber threats and how closer collaboration between departments, such as business continuity and information security, could help raise staff awareness.

  • How SD-WAN Can Benefit Branch Networks

    Sponsored by: Hughes Network Systems

    Gain valuable insights into why organizations are rapidly adopting cloud-based software networking technologies like SD-WAN to meet these next-generation WAN requirements. Then, uncover how you can bring distributed networks up to speed with simplicity and automation.

  • Plug Into the Network of the Future: Hyper-converged Infrastructure, SD-WAN, and Intent-based Networking

    Sponsored by: TechTarget Networking

    Hyper-converged infrastructure, SD-WAN, and intent-based networking: How all of these combine to create the future of networking technology remains to be seen. In the meantime, network managers continue to find the best ways to manage their expanding networks. Learn more in this issue of Network Evolution e-zine.

  • Buyer's Guide: Cybersecurity

    Sponsored by: Palo Alto Networks

    Keeping up with new attack techniques, and effectively defending against advanced threats, is perhaps the biggest challenge facing security teams today. This Cybersecurity Buyer's Guide provides an approach for organizations to use when evaluating cybersecurity protection strategies.

  • Firewall Buyer's Guide

    Sponsored by: Palo Alto Networks

    Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.

  • Buyers Guide: Network Security Management

    Sponsored by: Palo Alto Networks

    When it comes to network security, organizations often repeat processes. In this buyers guide, access 10 features your network security management should include and the benefits of network security management. As an added bonus, quiz yourself to determine if it's time to move to network security management.

  • A New Call for Alignment Between Business Needs and Enterprise Networks

    Sponsored by: TechTarget Networking

    In this issue of Network Evolution e-zine, we learn how more comprehensive IT-business strategic alignment would aid network managers. We focus on 3 key areas: hardware management, UC, and network security.

  • SIEM Analyst Research Bundle

    Sponsored by: AT&T Cybersecurity

    No matter the company size, a properly executed SIEM strategy is difficult to achieve as resources become constrained. Explore this white paper to uncover the key factors leading to a successful SIEM purchase and deployment for your organization.

  • New Options to Enable Remote Access in the Network

    Sponsored by: TechTarget Networking

    This handbook guides you through how to best enable remote access for your network as workloads go beyond the private data center. Then, learn how VPN evolution has changed remote access for more secure communication.

  • Guide to Early Application Testing and Understanding Dev and Ops Responsibilities

    Sponsored by: IBM

    Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices.

  • How to Think like a Hacker to Stop Application Security Threats

    Sponsored by: IBM

    Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize.

  • How to Secure Mobile Applications in a Private Cloud

    Sponsored by: IBM

    In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.

  • How to Boost Mobile Application Security

    Sponsored by: IBM

    In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks.

  • How to Build an Enterprise Application Security Program

    Sponsored by: IBM

    In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing.

  • IT Security Trends to Know

    Sponsored by: Cisco Umbrella

    The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts.

  • Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

    Sponsored by: Cisco Umbrella

    Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.