ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • How to Implement Network Microsegmentation

    Sponsored by: NTT Com Security (UK) Ltd

    Discover how microsegmentation can break up your data center into logical elements and reduce its susceptibility to catastrophic lateral movement of malicious activity once a breach occurs.

  • The Adaptive Security Platform: Secure the Modern Data Center

    Sponsored by: Illumio

    In this e-guide, uncover an interview with two security gurus from Illumio, a winner of our Network Innovation Award, on their Adaptive Security Platform (ASP). Learn the basics about this platform, and gain insights on how you can reduce complexity and develop a discerning data center security posture.

  • Mobile Data Security Threats: Hype vs. Reality

    Sponsored by: Lookout

    As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.

  • Cyberhunting: A Critical Component of Enterprise Security

    Sponsored by: Infocyte

    Cyberhunting – actively looking for signs of compromise in an organization and controlling and minimizing the overall damage – must be a part of your security program. Learn more about this proactive security approach, and how to implement it within your organization, in this e-guide.

  • DLP Tools Essential to Data Protection Strategy

    Sponsored by: Intel Security

    Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.

  • Mastering the Top Enterprise Mobility Challenges

    Sponsored by: Microsoft

    Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • Five Critical Rules for Firewall Management: Lessons from the Field

    Sponsored by: Dell SecureWorks

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.

  • Information Security Magazine: Insider Edition

    Sponsored by: TechTarget Security

    Attaining truly 21st century security requires new thinking. Learn how to deal with a vanishing network perimeter and bring on board the best new security tools to protect your enterprise.

  • What to Look for in Secure Sockets Layer

    Sponsored by: TechTarget Security

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

  • Is Your Network Too Flat? Prevent Data Breaches with Segmentation

    Sponsored by: TechTarget Security

    How do you determine if your network is too flat? Without proper network segmentation, attackers can easily move around the network, turning a minor problem into a major disaster. Learn about segmentation strategies that can improve your network security infrastructure in this issue of Information Security.

  • Is It Time to 'Software-Define' Your Network Security?

    Sponsored by: TechTarget Security

    This guide goes beyond most examinations of security in SDN, goes beyond explaining what SDN is and how it might improve network security. Instead, this publication looks in-depth at specific implementations of SDN. Readers will come away with a freshly packed toolkit of SDN-related actionable advice.

  • It's time to tackle IoT security

    Sponsored by: RUCKUS Networks

    The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.

  • How can proper BYOD and IoT device onboarding improve

    Sponsored by: RUCKUS Networks

    This e-guide explores the growing threat landscape for BYOD and IoT devices. Learn the reality behind what risks your network faces and how to mitigate potential threats.

  • The IT Security Manager's Guide to Incident Response & Shadow IT

    Sponsored by: Cisco Umbrella

    This expert guide presents 13 steps you should take to develop the best cybersecurity incident response plan, so you can be prepared for unknown threats to your network. You'll also learn about managing the potential damage that shadow IT can do to your enterprise.

  • Threat Intelligence Services: An Introduction

    Sponsored by: Cisco Umbrella

    Improve your enterprise security with threat intelligence services, as presented in this e-guide, and learn what you can expect when you hire an incident response provider to handle your ongoing crisis.

  • How to Overcome Middleware Security Risks

    Sponsored by: Red Hat

    This expert e-guide provides a step-by-step process to secure middleware through application lifecycle management, network security, and security for specific middleware tools and interfaces. Also discover a case study about how the FAA exploited web-oriented open source middleware to improve integration and cut costs.

  • The Problem Facing Advanced Threat Defense

    Sponsored by: UnitedLex

    The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.

  • Organizations Struggle through a Tough Year for SSL Protocols

    Sponsored by: Symantec Website Security

    In this expert e-guide, learn the three primary SSL security issues and the common mistakes organizations make when trying to secure their website. Continue reading and discover how to avoid falling prey to the top SSL/TLS threats.

  • How to Evaluate UCaaS Providers' Security Measures

    Sponsored by: Carousel Industries

    This e-guide discusses ways you can address the security concerns of UCaaS, including multi-tenancy and encryption. It goes on to provide ways you can evaluate the security measures that potential UCaaS vendors are building into their services.

  • SSL Certificate Management: How to Avoid Common Mistakes

    Sponsored by: Symantec Website Security

    This expert e-guide describes the most common SSL certificate management mistakes and provides advice on how to avoid them. Discover how to choose the best certificates for your enterprise's needs, manage renewal of certificates, and more.

  • SSL Certificate Management: A Practical Guide

    Sponsored by: Symantec Website Security

    This expert e-guide breaks down SSL certificate management into practical, accessible terms. Discover the basics of SSL certificates, learn how you can prevent and troubleshoot problems in certificate management, and see examples of SSL certificate management tools at work.

  • Encryption's Risks, Benefits, and Roles in SSL Attacks

    Sponsored by: Symantec Website Security

    In this e-guide, expert Nick Lewis details ways to defend against SSL attacks. First, you'll uncover how to detect SSL attacks by inspecting network connections for anomalies. Next, you'll learn the importance of decoding SSL connections to further enable their detection and, ultimately, their mitigation.

  • Networking Engineering in Extraordinary Places

    Sponsored by: TechTarget Networking

    In this edition of the Network Evolution e-zine, find out how network locations dictate the need to adapt to new and sometimes unusual challenges.

  • Under Attack? 2016 Defenses Escape Compromise

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.