ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Improve Endpoint Security with Advanced Tools and Techniques

    Sponsored by: OPSWAT inc

    Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection.

  • How to Find the Best DDoS Attack Prevention and Detection Tools

    Sponsored by: TechTarget Security

    Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you.

  • Choosing the Best SD-WAN Architecture for Your Network

    Sponsored by: Singtel

    In this expert e-guide, industry experts explore what key considerations you should weigh when choosing an SD-WAN architecture that suits your organization's specific needs. Learn about building your optimal SD-WAN based off of traffic patterns, which vertical industries can benefit most from SD-WAN, and estimating SD-WAN's ROI.

  • How the Basics of Network Security Have Evolved

    Sponsored by: Fortinet, Inc.

    In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

  • 7 Steps to Overcome SSL Security Issues and Vulnerabilities

    Sponsored by: Fortinet, Inc.

    As SSL technology evolves and changes, new vulnerabilities begin to cause problems. Inside this guide, industry expert Rob Shapland explains how security professionals can overcome these SSL security issues with 7 key steps.

  • Tech to Protect Against Ransomware, Ensure Hospital Data Security

    Sponsored by: Cisco Umbrella

    Keith Jennings, CIO at Mass General Hospital in Boston, and Andrew Rosenberg, M.D., interim CIO at the University of Michigan Health System in Ann Arbor, discuss key technology and strategies to prevent ransomware attacks.

  • Healthcare Ransomware Attack: Prevention and Backups Are Critical

    Sponsored by: Cisco Umbrella

    In this e-guide, explore 6 pointers for preventing ransomware attacks according to Harun Rashid, VP of Global Health Services and CIO of Children's Hospital of Pittsburgh of UPMC.

  • Ten Ways to Stop a Ransomware Threat Targeting Healthcare Data

    Sponsored by: Cisco Umbrella

    Ransomware attacks are up across the board, but not many organizations are as vulnerable to targeted ransomware attacks as healthcare organizations. Uncover 10 ways that you can stop a ransomware threat from targeting your healthcare data, as shared by health IT expert Reda Chouffani.

  • How SD-WAN now benefits deployment and app delivery

    Sponsored by: Silver Peak

    Deploying SD-WAN technology can solve a lot of problems in the wide area network, but networking pros still need to do their homework before they buy. This TechTarget guide to SD-WAN deployment has the info you need to pick the right SD-WAN for your organization.

  • SD-WAN's Impact on Routers, and Riverbed Upgrades SteelConnect

    Sponsored by: Riverbed Technology, Inc.

    This expert e-guide explains how SD-WAN is ending the need for stand-alone enterprise routers and optimization technology in the WAN. Additionally, learn what Riverbed's SD-WAN upgrade means for SteelConnect.

  • Ransomware Detection and Prevention Tools You Need Now

    Sponsored by: TechTarget Security

    Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.

  • How to Find the Best DDoS Attack Prevention and Detection Tools

    Sponsored by: TechTarget Security

    In this handbook, one expert reveals how to select tools that will best strengthen your defense against DDoS attacks. Uncover 4 key questions to ask as you begin your DDoS defense strategy.

  • Use a web app firewall to halt app attacks

    Sponsored by: TechTarget Security

    Web application firewalls are more essential than ever when it comes to halting app attacks. Learn what features and functions you should look for when choosing a new WAF.

  • Navigating the Data Center Networking Architecture and the Relevance of Composable Infrastructure

    Sponsored by: Hewlett-Packard Enterprise

    Download this guide to overcome the complexity modern data center networking architectures create, including the impact of hybrid cloud on workload segregation, service-policy enforcement, and security. Additionally, experts highlight composable infrastructure as a new method for server simplification.

  • Content Delivery Networks Take on New Roles

    Sponsored by: Limelight Networks, Inc.

    Content delivery networks (CDNs) can pave the way for using rich media in an enterprise but make sure you understand how it works. In this e-guide, Tom Nolle, President of CIMI Corporation dives into how CDNs work, their protection from denial of service attacks and the new mission for CDN providers.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • The Touch-Free Future and Current Adoption Trends of SDN

    Sponsored by: Juniper Networks, Inc.

    There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise.

  • From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts

    Sponsored by: HP Inc

    In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • SDN: The Key to Better Security

    Sponsored by: Juniper Networks, Inc.

    Software-defined networking may hold the key to better security. In this expert e-guide, Principal Analyst, Lee Doyle explains how to strengthen SDN network security to prevent breaches. And Security and Systems Engineer, Judith M. Myerson, dives into improving SDN controller security with a 5 step risk management plan.

  • Advanced Attacks are Catching On - Here's What you can Do

    Sponsored by: Kaspersky

    In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.

  • Bridge the Network Security Gap in IP Multifunction Machines

    Sponsored by: HP Inc

    In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.

  • DNS Co-Founder Discusses the Need for a More Secure DNS

    Sponsored by: Dyn

    This expert e-guide features a Q&A with Paul Mockapetris, inventor of the Domain Name System, where he discusses the immediate need for a more secure DNS and Internet. Additionally, learn what security risks IoT will bring to DNS.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.