ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Protecting Business and Remote Workers from Covid-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • The Cloud is the New Center of Data

    Sponsored by: Apcela

    Some enterprises have closed down their data centers, but it doesn’t seem likely that another 7 out of 10 enterprise data centers will go offline in just five years. In this brief, learn why a new paradigm is needed to extend the WAN beyond the data center to the multi- and hybrid cloud environment in which the modern enterprise operates.

  • MPLS, SD-WAN, Internet, and SASE

    Sponsored by: Cato Networks

    The WAN is the backbone of the business. It ties together your remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. In this white paper, learn about the connectivity, optimization and security options that are needed when building a network for the digital business.

  • Apcela Arcus Platform: Enterprise Multicloud WAN

    Sponsored by: Apcela

    Apcela Arcus Platform allows enterprises to easily plug their existing network into a SD-WAN that was built for today’s multi-cloud environment. In this brief, learn more about the Apcela Arcus Platform.

  • Pioneering DIY retailer future proofs SD-WAN security.

    Sponsored by: Barracuda

    Organizations looking to migrate firewall security, simplify network management, improve visibility, enhance connectivity and regulate traffic would gain much valuable information from this case study. It details a DIY retail chain that faced these challenges and how they were able to overcome them through upgrading their security architecture.

  • Barracuda SD-Wan Zero Touch Deployment

    Sponsored by: Barracuda

    Tune into this video for a brief walkthrough of how to use Barracuda CloudGen Firewall to deploy SD-WAN.

  • Barracuda SD-Wan Overview

    Sponsored by: Barracuda

    SD-WAN aims to relieve you of some of the burdens associated with MPLS circuits. Tune into this video for more info on the importance of SD-WAN in the cloud era, 7 key components of SD-WAN, and more.

  • Barracuda CloudGen Firewall Savings Calculator

    Sponsored by: Barracuda

    How could your business benefit from a cloud-based firewall that includes protection against advanced persistent threats with full SD-WAN, link balancing, and WAN Optimization discipline? Find out by using the following cost and savings calculator for Barracuda's CloudGen Firewall.

  • Top IT predictions in APAC: 2021

    Sponsored by: TechTarget ComputerWeekly.com

    Going by the predictions fleshed out by technology suppliers and analysts, the Asia-Pacific region will continue to be a cradle for technology innovation, whether it is 5G services, artificial intelligence (AI), cloud computing or cyber security. In this infographic, we review some of the key IT trends that are likely to shape the industry in 2021.

  • A Computer Weekly Buyers Guide to 5G

    Sponsored by: TechTarget ComputerWeekly.com

    Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.

  • MicroScope – January 2021: Looking forward to the future

    Sponsored by: MicroScope

    In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success

  • 2021 IT Priorities: APAC report

    Sponsored by: TechTarget ComputerWeekly.com

    Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

  • SD-WAN: Accelerating network transformation in APAC

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.

  • IT/OT convergence is necessary, but not so simple

    Sponsored by: TechTarget ComputerWeekly.com

    This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • How to get actionable threat intelligence from tech tools

    Sponsored by: TechTarget Security

    Automated threat intel products and services can't produce actionable threat intelligence without essential ingredients, like threat hunters, analysts and administrators. This guide teaches cybersecurity pros how to how to pluck usable threat intelligence from a sea of data.

  • Network Performance Issues are IT Pain Point Amid COVID-19

    Sponsored by: NetAlly

    Reliable home network performance is a top issue IT teams have dealt with amid the COVID-19 pandemic. With almost entire workforces working from disparate locations, remote networks are nearly impossible to monitor and manage. In this e-guide, learn how home network performance issues can relate to other IT problems.

  • Can a SASE architecture deliver better network performance?

    Sponsored by: TechTarget Networking

    Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: TATA Communications

    Ensuring security in a software-defined WAN implementation is crucial, but it's often easier said than done. The SD-WAN security equation comprises multiple variables. In this e-guide, uncover 4 different areas where enterprises should consider SD-WAN and security, as well as the core capabilities to include in an SD-WAN security checklist.

  • How IAM Systems Support Compliance

    Sponsored by: Beta Systems

    Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.

  • 9 essential elements of network security

    Sponsored by: TechTarget ComputerWeekly.com

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

  • Why You Should Consider Endpoint Detection & Response

    Sponsored by: Claranet

    Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.

  • Why you Should Consider SASE for SD-WAN

    Sponsored by: Fortinet, Inc.

    SD-WAN is revolutionizing the way employees connect to their networks. And this is great, but much of what SD-WAN has to offer can be improved with the implementation of a SASE architecture. Dive into this e-guide to get the scoop on why SD-WAN and SASE go together like PB&J.

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: Citrix

    SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.