ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Traffic Management Research

  • SIG - SASE in 15 minutes

    Sponsored by: Cisco Umbrella

    Secure Access Service Edge (SASE) is a cloud-delivered service that combines security and networking capabilities to provide improved performance and security for any device, location and user. Watch this webinar to learn how SASE can help your organization.

  • Dually Deceptive: Two New Phishing Scams Swimming by Your SEG

    Sponsored by: Inky Technology

    Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.

  • XDR: Extended Detection and Response

    Sponsored by: Palo Alto Networks

    Extended detection & response (XDR) has emerged in the wake of a need to detect, investigate and respond to threats across all threat vectors in a company’s infrastructure (network, endpoint and cloud) rather than just one. Dive into this white paper to learn about XDR and how it uses integration and orchestration as defense.

  • The Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation

    Sponsored by: Palo Alto Networks

    Endpoint detection and response (EDR) is quickly becoming a ubiquitous security technology in the age of remote work. As such, it is critical for security professionals to be aware of the vendors in the space. Tap into the Ultimate Guide to the MITRE ATT&CK Round 2 EDR Evaluation to help you pick the right tool for your organization.

  • Security Orchestration

    Sponsored by: Palo Alto Networks

    Security orchestration is a new term to the market, but it could simplify the lives of security professionals. It refers to the integration of security tools, unifying intelligence and automating tasks, resulting is a more effective security operations center that better detects and responds to threats. Dive into this e-book for a detailed guide.

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • Network Performance Issues are IT Pain Point Amid COVID-19

    Sponsored by: NetAlly

    Reliable home network performance is a top issue IT teams have dealt with amid the COVID-19 pandemic. With almost entire workforces working from disparate locations, remote networks are nearly impossible to monitor and manage. In this e-guide, learn how home network performance issues can relate to other IT problems.

  • Why You Should Consider Endpoint Detection & Response

    Sponsored by: Claranet

    Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.

  • Why, and how, to merge your SD-WAN and security strategies

    Sponsored by: SearchNetworking.com

    SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.

  • The Pros and Cons of SD-WAN for Public Cloud Computing

    Sponsored by: VMware and Intel

    In this expert e-guide, we explore how SD-WAN is positioned to help keep up with the dramatic changes that public cloud has wrought on enterprise network traffic flows – but not with a blind eye. Learn about both the benefits and the pitfalls of SD-WAN in an increasingly cloud-first, digitally transformative business world.

  • What SD-WAN Means for Today's Businesses

    Sponsored by: Verizon

    Learn from Lee Doyle, Principal Analyst at Doyle Research, about how a mature SD-WAN market can bring distributed networks up to speed with simplicity and automation. Then, find out how to exactly tailor SD-WAN for your business needs.

  • Choosing the Best SD-WAN Architecture for Your Network

    Sponsored by: Singtel

    In this expert e-guide, industry experts explore what key considerations you should weigh when choosing an SD-WAN architecture that suits your organization's specific needs. Learn about building your optimal SD-WAN based off of traffic patterns, which vertical industries can benefit most from SD-WAN, and estimating SD-WAN's ROI.

  • In-house Network Test Labs and SDN Switching Assessment

    Sponsored by: Juniper Networks, Inc.

    Keeping an in-house network test lab up to date requires considerable expertise. Learn how to avoid the complexity of maintaining an internal lab by utilizing a virtual test environment. Additionally, learn how expert bloggers assess SDN switching at UNH InterOperability Laboratory.

  • The SDN Charge and the New Role in Mobile Security

    Sponsored by: Juniper Networks, Inc.

    Take a closer look at the benefits and challenges of an SDN-WAN and network function virtualization (NFV) deployment. Additionally, this guide illustrates SDN's new security methodologies, which are reshaping mobile security today.

  • Storage Networking Technology Steps Up to Overcome Performance Challenges

    Sponsored by: IBM

    Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.

  • Application Infrastructures That Make Updates Easy

    Sponsored by: Cisco Systems, Inc and Citrix

    This in-depth video discusses the advantages of one system that steps up to the plate when it comes to scalable networking and application upgrading. Access now to learn how you can streamline and simplify your processes, ultimately slashing project costs.

  • How SSL and TLS Secure Network Transactions

    Sponsored by: Symantec & Blue Coat Systems

    This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.

  • 10 Common Problems that Application Performance Management Helps You Solve

    Sponsored by: Riverbed Technology, Inc.

    This white paper breaks down the top ten quality and performance issues that application performance management can help to solve by detecting applications' performance problems and their causes.

  • SIP trunking services close cost gaps around mobility

    Sponsored by: Cox Communications, Inc.

    Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.

  • Is Your Network Traffic Invisible?

    Sponsored by: Globalscape

    This brief guide explores the importance of network monitoring and outlines the benefits of increased visibility.

  • Intelligent Traffic Replication & Filtering for Virtual Machines

    Sponsored by: Gigamon

    Access this informative white paper to find out how this vendor's node allows specific traffic flows to be selected, forwarded and delivered to the right analysis, monitoring or security devices – with additional info on its features and benefits.

  • Visibility into Virtual Environments

    Sponsored by: Gigamon

    Check out this brief webcast to discover how a network traffic visibility tool works, and if it would be a good fit for your organization's IT environment.

  • Preventing Data Center Downtime

    Sponsored by: Gigamon

    It goes without saying that your data center is the lifeblood of your organization. This guide explores how you can minimize data center downtime and why doing so is extremely important.

  • Cisco Visual Networking Index Global Mobile Data Traffic Forecast for 2013 to 2018

    Sponsored by: Cisco Systems, Inc.

    This interactive webpage outlines some top trends in mobile data trafficking and explains how this will affect the way IT departments deal with the rising traffic.

  • Next-Gen WLAN: How 802.11ac Will Change Your Network Forever

    Sponsored by: SearchNetworking.com

    With the IEEE 802.11ac-2013 standard approved, WLAN data rates are poised to soar to multiple-gigabit territory. This Technical Guide focuses on the WLAN's evolution and why it will soon be a viable alternative to Ethernet.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.