ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Research

  • Maximizing LTE & 5G Inside & Beyond Retail Stores

    Sponsored by: Cradlepoint

    The ways and places that retailers serve customers have changed a great deal recently. Whether it’s a long-term location or a self-serve kiosk, one of the biggest necessities is dependable connectivity. In this white paper, learn why retailers are turning to Wireless WAN to support the unique challenges of retail connectivity.

  • The Cisco Umbrella Advantage

    Sponsored by: Cisco Umbrella

    Today, the network perimeter is expanding and blurring. Remote workers are bypassing the VPN and data is bypassing perimeter security. Traditional security just can’t keep up. In this e-book, learn how Cisco Umbrella DNS-layer security can help you see and block threats before they ever reach your network or endpoints.

  • Trends in Connected Technologies for First Responders

    Sponsored by: Cradlepoint

    In this white paper, examine the role connected technologies play in the effectiveness and safety of first responders and explore considerations for evaluating mobile network solutions that enable it all to work securely and reliably.

  • 7 Ways to Take Cybersecurity to New Levels

    Sponsored by: Cisco Umbrella

    Contrary to popular belief, more security tools don’t always mean better security. As business environments grow more complex, it’s critical for security to have a holistic, unified approach. Read this white paper to discover 7 ways organizations can enhance their security stack with cloud security, without sacrificing customization and control.

  • The Cloud is the New Center of Data

    Sponsored by: Apcela

    Some enterprises have closed down their data centers, but it doesn’t seem likely that another 7 out of 10 enterprise data centers will go offline in just five years. In this brief, learn why a new paradigm is needed to extend the WAN beyond the data center to the multi- and hybrid cloud environment in which the modern enterprise operates.

  • MPLS, SD-WAN, Internet, and SASE

    Sponsored by: Cato Networks

    The WAN is the backbone of the business. It ties together your remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. In this white paper, learn about the connectivity, optimization and security options that are needed when building a network for the digital business.

  • Apcela Arcus Platform: Enterprise Multicloud WAN

    Sponsored by: Apcela

    Apcela Arcus Platform allows enterprises to easily plug their existing network into a SD-WAN that was built for today’s multi-cloud environment. In this brief, learn more about the Apcela Arcus Platform.

  • Gartner Market Guide for Security Orchestration, Automation and Response Solutions

    Sponsored by: ServiceNow

    This Gartner report provides a holistic market analysis of security orchestration, automation response (SOAR) solutions: Why they are gaining popularity, who the key players are and how to select a vendor suited to your needs. Read on to unlock the key research findings and Gartner’s recommendations.

  • Building a Strong and Effective Incident Response Plan

    Sponsored by: ServiceNow

    Literally every business -- both large and small and across every industry -- is a target for criminal hackers and careless employees alike. The question is: What are you doing about it? This is where incident response comes into play. In this e-guide, learn how to create an effective incident response plan.

  • How Your Government Agency Can Increase Productivity, Visibility, Security and Reduce Costs

    Sponsored by: ServiceNow

    IT security teams in the public sector are challenged with providing security and innovation while driving down costs. Download this report to take a closer look at the challenges plaguing government agencies and discover a platform that can help to facilitate innovation without exhausting resources.

  • Thailand's Government Savings Bank

    Sponsored by: Comforte AG

    Thailand's Government Savings Bank (GSB) needed an easy-to-implement solution that would map out sensitive data across a large and highly complex network and render that data unreadable, all without affecting service levels. In this case study, learn how GSB was able to achieve next level security after deploying comforte's Data Protection Suite.

  • Improve Your Situational Awareness

    Sponsored by: ServiceNow

    In this resource, learn how a Trusted Security Circle allows security teams to anonymously share observable data with industry peers, members of their supply chain or a global circle.

  • 2021 Top Sd-Wan Edge Trends

    Sponsored by: Aruba Networks

    SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.

  • Making Sense of Zero-Trust Security

    Sponsored by: TechTarget

    As security professionals continue searching for methods of keeping out intruders, they make clear their thoughts about zero trust and how its philosophy can keep users safer. As it stands, 40% of professionals support zero trust for their organizations – do you? Take our survey to let us know, and receive a FREE zero-trust guide as a bonus.

  • Top IT predictions in APAC: 2021

    Sponsored by: ComputerWeekly.com

    Going by the predictions fleshed out by technology suppliers and analysts, the Asia-Pacific region will continue to be a cradle for technology innovation, whether it is 5G services, artificial intelligence (AI), cloud computing or cyber security. In this infographic, we review some of the key IT trends that are likely to shape the industry in 2021.

  • A Computer Weekly Buyers Guide to 5G

    Sponsored by: ComputerWeekly.com

    Despite the fears of many that rollouts of the next generation infrastructure would be delayed or just not be possible due mainly to the adverse economic conditions caused by Covid-19, the prospects are actually quite bright for the 5G industry in 2021.

  • MicroScope – January 2021: Looking forward to the future

    Sponsored by: MicroScope

    In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success

  • 2021 IT Priorities: APAC report

    Sponsored by: ComputerWeekly.com

    Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.

  • 9 essential elements of network security

    Sponsored by: ComputerWeekly.com

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

  • How to get actionable threat intelligence from tech tools

    Sponsored by: SearchSecurity.com

    Automated threat intel products and services can't produce actionable threat intelligence without essential ingredients, like threat hunters, analysts and administrators. This guide teaches cybersecurity pros how to how to pluck usable threat intelligence from a sea of data.

  • Network Performance Issues are IT Pain Point Amid COVID-19

    Sponsored by: NetAlly

    Reliable home network performance is a top issue IT teams have dealt with amid the COVID-19 pandemic. With almost entire workforces working from disparate locations, remote networks are nearly impossible to monitor and manage. In this e-guide, learn how home network performance issues can relate to other IT problems.

  • Can a SASE architecture deliver better network performance?

    Sponsored by: SearchNetworking.com

    Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: TATA Communications

    Ensuring security in a software-defined WAN implementation is crucial, but it's often easier said than done. The SD-WAN security equation comprises multiple variables. In this e-guide, uncover 4 different areas where enterprises should consider SD-WAN and security, as well as the core capabilities to include in an SD-WAN security checklist.

  • How IAM Systems Support Compliance

    Sponsored by: Beta Systems

    Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.