ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • The Security Risks of Network Sensors in the Enterprise

    Sponsored by: IBM

    In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.

  • The Anatomy of DDoS Attacks And Best Practices for Preventing Them

    Sponsored by: Arbor Networks

    This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: Synopsys

    This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.

  • How to Fend Off Hackers with Frequent App Security Testing

    Sponsored by: Synopsys

    In this expert guide, learn about the realities of the threat hackers pose to your business, as well as several ways that constant app security testing can help close up the gaps in which hackers could sneak in. Then, learn some of the challenges that implementing security testing could pose.

  • How to Use an Incident Response Policy to Better Collaborate

    Sponsored by: Delta Risk

    In this e-guide learn how to not only prepare your organization's response to a security incident, but also how to work with outside forces more effectively to detect, analyze, contain, and eradicate – as well as, recover essential data.

  • 5 Ways to Prevent a Ransomware Infection through Network Security

    Sponsored by: IBM

    Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.

  • Ransomware Protection is Futile, but All Hope is Not Lost

    Sponsored by: Dell Software

    Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.

  • Importance of Incident Response Collaboration

    Sponsored by: Dimension Data

    This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs.

  • 6 Crucial Incident Response Policy Mistakes to Avoid

    Sponsored by: Delta Risk

    Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.

  • The Benefits of Conducting a Network Security Overview

    Sponsored by: Gigamon

    By preventing rogue projects from proliferating, and adopting a holistic approach to security, you can begin to prove the value of the security team. Access this e-guide to learn more about the benefits of conducting security overviews of every enterprise initiative and tightening up your enterprise's cybersecurity practices.

  • IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy

    Sponsored by: Aruba Networks

    The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.

  • Blended IT and Security Operations: Where's the Balance?

    Sponsored by: ServiceNow

    Within this informative e-guide, you'll learn the benefits – and the risks – of integrating IT and security operations. Discover how you can leverage information collected from multiple data sources to get an accurate picture about the issues affecting both security and performance.

  • Five Ways to Prevent a Ransomware Infection

    Sponsored by: Dimension Data

    Access this e-guide for IT security expert Kevin Beaver's 5 ways that you can bolster your network security to prevent ransomware from infecting your enterprise systems.

  • Say Hello, Again, to SIEM

    Sponsored by: TechTarget Security

    This expert handbook provides 3 tips to get the most out of your existing SIEM system. Plus, uncover important SIEM capabilities when evaluating SIEM for real-time analytics use.

  • IT Needs to Change its Mindset Around Mobile Data Access

    Sponsored by: Hewlett Packard - Intel Xeon

    To successfully support enterprise mobility, IT admins need to change the way they think about mobile data access, security, and more. This e-guide details four things to keep in mind as your enterprise embraces this mobile world.

  • What You Need to Know When Choosing Between Office 2016 and Office 365

    Sponsored by: TechTarget Enterprise Desktop

    Use this expert e-book to discover whether the local Office 2016 or cloud-based Office 365 is the right fit for your enterprise. Explore topics such as the different costs of each program, increased file encryption in Office 2016, and the system requirements that it takes to run each Office suite.

  • IT Battles the Top Three Mobile Security Threats

    Sponsored by: Hewlett Packard - Intel Xeon

    Learn about 3 mobile security threats facing IT managers and security experts today. Access now to learn what best practices are being deployed to face the rapidly growing danger to your mobile devices.

  • SD-WAN Helps Secure Hybrid Networks

    Sponsored by: Citrix

    SD-WAN enables enterprises to create hybrid networks. But many network engineers eyeing hybrid WAN architectures are asking themselves the question: It can't be as safe as running on MPLS, right? Access this expert e-guide to learn about SD-WAN platforms' security features that finally make hybrid networks secure enough for widespread use.

  • How to Handle the IoT from the Data Center to Security

    Sponsored by: Xively by LogMeIn

    In this e-guide, learn how experts ensure IoT devices can stand up to the scope of modern security challenges, and what IT pros are doing to help the data center support IoT data from numerous sources.

  • Software-Defined Network Security: A 'No-Touch' Approach

    Sponsored by: VMware

    Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.

  • Microsegmentation Strategies for Smarter Security

    Sponsored by: VMware

    In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.

  • Healthcare CIOs Address Cybersecurity Vulnerabilities

    Sponsored by: Optum

    As breaches continue in healthcare, it's imperative that CIOs know what best practices and technologies they should be implementing to safeguard their organization. Discover the proven practices that best stave off healthcare cybersecurity vulnerabilities based on advice from four CIOs attending HIMSS 2016.

  • Is UTM Ready for the Big Leagues?

    Sponsored by: TechTarget Security

    This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.

  • Is UTM Ready for the Big Leagues?

    Sponsored by: TechTarget Security

    This Technical Guide reviews advanced UTM and what elements make for a truly enterprise-class UTM device.

  • The Pros and Cons of Microsegmentation for your Virtualized Environments

    Sponsored by: NTT Com Security (UK) Ltd

    Microsegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.