ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Secure Your Internal Corporate Networks With ABAC

    Sponsored by: Cryptzone

    In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.

  • Modern Mobility E-zine – January

    Sponsored by: TechTarget Mobile Computing

    Discover why many IT departments continue to struggle with compliance in the mobile era and what tools are available to help admins get a better grasp on best practices. Access this e-zine to also get an exclusive, in-depth look at how to ease into EMM in the modern era.

  • Threat Monitoring in Tough Times

    Sponsored by: TechTarget Security

    Today's threat environment can be murky, and advanced security monitoring is essential. Access this three-part guide and learn the latest means for rooting out the fast-moving malicious actors that are targeting your enterprise's systems.

  • Resolve to Revitalize Your SIEM Security

    Sponsored by: TechTarget Security

    This expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.

  • Breaking the Cyber Attack Lifecycle

    Sponsored by: Palo Alto Networks

    This white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.

  • Network Evolution: November Issue

    Sponsored by: TechTarget Networking

    This issue of Network Evolution, examines real SDN use cases and deployment models for mainstream enterprises. Also in this issue, network engineers weigh in on how the growing pressure to improve their fluency in security is affecting their jobs.

  • Information Security Magazine: November Issue

    Sponsored by: TechTarget Security

    What strategies are companies using to protect data against mobile security threats? In Information Security, we ask CISOs who have been there: What works?

  • Network Evolution: October Issue

    Sponsored by: TechTarget Networking

    This eZine outlines the latest trends in networking today. Read on to dive into monitoring the network to optimize the end-user experience. Hear from network engineers and other IT pros who share their tips and techniques for keeping users happy.

  • Global Threats and an Intelligent Response

    Sponsored by: TechTarget Security

    In today's world of multipronged, global threats, a global threat intelligence service is becoming essential to enterprise security strategy.

  • The Economics of Defense: Modeling Security Investments Against Risk

    Sponsored by: Juniper Networks, Inc.

    There are a number of factors to take into account when building, or modifying, your cybersecurity strategy – and inside this report, take a look at 5 drivers that influence the costs of cybersecurity.

  • Protecting Data on the Go

    Sponsored by: TechTarget Security

    This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.

  • Network Evolution: Shifting the Focus to SD-WAN

    Sponsored by: TechTarget Networking

    In this exclusive issue of the 'Network Evolution' magazine, explore the promise of SD-WAN, why enterprises are so interested in it and what it means for the future of WAN optimization.

  • The Problem with the Padlock

    Sponsored by: TechTarget Security

    TLS/SSL is no longer a Web security cornerstone. While the industry responds to its vulnerabilities, with TLS 1.3, learn what else you must do to keep your connections secure.

  • Can New Security Tools Keep Your Network Clean?

    Sponsored by: TechTarget Security

    Modern networks have immense amounts of data passing through them daily, and keeping that data clean of sophisticated malware is a sizable undertaking. In this issue of Information Security, learn what advanced monitoring tools are right for your network's particular needs.

  • Buyer's Essentials: What to Look for in an EMM Strategy

    Sponsored by: TechTarget Security

    EMM products can contain a variety of features - for mobile device management, mobile app management, mobile content management and more. This guide will review the capabilities and features you'll want to consider carefully before you invest in EMM.

  • Fighting Cybercrime in the 21st Century

    Sponsored by: TechTarget Security

    Strengthen your security with these expert insights into fighting advanced crimeware.

  • Information Security Magazine – May 2015 Issue

    Sponsored by: TechTarget Security

    In this issue of Information Security magazine, we study perimeter network security in the mobile and cloud era, and strategies to secure access from application-layer protection to single sign-on technologies.

  • The Essential Guide for Threat Intelligence Services: What to Look For

    Sponsored by: TechTarget Security

    This Buyer's Essential guide explains what you need to know if you're in the market for a threat intelligence service. It outlines the must-have features, like a threat intelligence score, and also explains what you need to do to ensure you benefit as much as possible from adding a threat intelligence feed to your security system.

  • The Bot Threat

    Sponsored by: Hewlett Packard Enterprise

    In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.

  • Resolve to Revitalize Your SIEM Security

    Sponsored by: IBM

    This expert guide explores some of the latest developments in SIEM technology and how you can best take advantage of them.

  • The Transformation of Wireless Network Security

    Sponsored by: TechTarget Security

    This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.

  • Putting Network Security Into Context

    Sponsored by: TechTarget Networking

    Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.

  • Endpoint protection: Whitelisting and Beyond

    Sponsored by: TechTarget Security

    Application whitelisting is a valuable security tool but it's riddled with complexity. This handbook takes a look at whitelisting capabilities, with an eye to the NIST cybersecurity framework and suggests best practices for implementing or managing a whitelist in your enterprise.

  • Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD

    Sponsored by: TechTarget Security

    Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.

  • How SSL and TLS Secure Network Transactions

    Sponsored by: Symantec & Blue Coat Systems

    This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.