Research Library

Powered by

Networking Research

  • Juniper Connected Security: Dynamic, Adaptive Multi-cloud Security

    Sponsored by: Juniper Networks

    Download this white paper to learn about Juniper Networks' Connected Security framework—which uses dynamic access groups and a unified and intuitive metadata-based policy model that can be ported across clouds—to give security admins complete command and control over their multi-cloud deployments.

  • Discover Unified Communications and Collaboration as a Service

    Sponsored by: Verizon

    In this white paper, learn about Verizon's Global Private IP Service, a private network designed to support your critical unified communications and collaboration while maintaining security in the cloud.

  • CW ASEAN Trend Watch April 2019

    Sponsored by:

    Businesses the world over are gradually turning up the dial on 5G. In this handbook, focused on business IT in the ASEAN region, Computer Weekly looks at the great spectrum conundrum, considers the potential of digital indoor systems and weighs up the challenges and opportunities that 5G presents for edge computing

  • CW ANZ Trend Watch April 2019

    Sponsored by:

    Businesses the world over are turning up the dial on 5G.

  • CloudHubs and the Future of WAN Architecture

    Sponsored by: Apcela

    In today's "cloud-first" environment, many enterprises are coming to realize that they need to have data center resources hosted where their applications already are or are going: in the cloud. Read this white paper to learn the common reasons why enterprises are increasingly embracing a cloud-first data center infrastructure.

  • The Truths and Lies of IoT Security: Monitoring Connected Devices

    Sponsored by: MASERGY

    As the Internet of Things (IoT) accelerates the pace of the enterprise with data-driven decision making, CEOs, CIOs, and CISOs are making the dash for the IoT playing field. But how do they get in the game while not jeopardizing security? In this white paper, learn about key security considerations for IoT.

  • IoT Readiness: 5 Network and Security Necessities

    Sponsored by: MASERGY

    In this white paper, learn about the 5 networking and security features that can help ensure your infrastructure is ready for IoT.

  • CW Middle East ezine April 11 2019

    Sponsored by:

    It's that time of year again when the Computer Weekly/TechTarget IT Priorities 2019 survey results are out, so in this issue we take a look at some of the findings.

  • Beyond the Buzzword: SD-WAN

    Sponsored by: Softchoice

    What is SD-WAN, really? Why should you consider it? Who is it for? How do you leverage it to meet your specific business and IT goals? In this guide, find out what all the buzz is about surrounding SD-WAN.

  • Citizens Broadband Radio Service (CBRS): Redefining Communications

    Sponsored by: Motorola, Inc.

    What is the Citizens Broadband Radio Service (CBRS) and what does it mean for your organization? Find out in the white paper, and separate fact from fiction by busting 4 CBRS myths.

  • Global Payments Technology Company Achieves PCI Compliance

    Sponsored by: comForte AG

    An American multinational financial services corporation was looking for a comprehensive solution that adequately encrypted user data, didn't reduce network performance and complied with industry standards. In order to meet these goals, find out how they leveraged comforte's SecurDPS.

  • Intent-Based Networking: What to Know

    Sponsored by: TechTarget

    The hype machine for intent-based networking (IBN) has been working overtime for the past 18 months. Yet, despite all the hoopla and attention, many people are left wondering what IBN can actually do for them in 2019. Find out in our guide, Complete Guide to Intent-Based Networking, which you'll receive after a multiple-choice survey.

  • April ezine: SD-WAN more than just networking

    Sponsored by: MicroScope

    An issue covering SD-WAN, storage innovations and opportunities for channel growth

  • SD-WAN Network Connectivity Design: A 3-Step Process to Balance Price, Performance, and Risk

    Sponsored by: MASERGY

    SD-WAN is making it easier than ever to diversify WAN connectivity but this new agility brings with it the responsibility to engineer the smartest network design. In this white paper, explore best practices and a 3-step process you can use to help you design your network.

  • WAVE Push-to-Talk: Connect Mobile Workers Quickly & Securely

    Sponsored by: Motorola, Inc.

    Whether you rely on smartphones, radios, computers, or landlines, find out how you can enable push-to-talk (PTT) communications across broadband and radio networks so that critical, time-sensitive information flows quickly and securely between mobile workers and teams.

  • Every Guest Experience Perfected with Unified Voice and Data Communications

    Sponsored by: Motorola, Inc.

    For the hospitality sector, embracing new technology while retaining the personal touch is crucial—but how do you do that? Having unified voice and data communications can significantly help. Learn more about it in this white paper.

  • The Benefits of Network Visibility for Industrial Automation

    Sponsored by: Forescout

    Industrial assets owners have little to no visibility into existing industrial threats and flaws, and therefore no way to anticipate, analyze and respond to incidents. This whitepaper shows how the use of network monitoring technology in manufacturing networks brings tremendous value to both information technology and operational technology teams.

  • Using Fiber-Based Internet to Sharpen Business Agility and Profitability

    Sponsored by: Spectrum Enterprise

    Mirazon, an IT consulting firm, wanted to upgrade their Internet service to offer remote security and managed solutions to a diverse range of customers. Mirazon chose to implement Spectrum Enterprise Fiber Internet Access. Learn about the benefits they've experience since switching to Spectrum in this case study.

  • How Passive Monitoring Can Streamline NERC CIP Compliance

    Sponsored by: Forescout

    The North American Electric Reliability Corporation Critical Infrastructure Protection (NERC CIP) standards are a set of requirements designed to secure the assets required for operating North America's bulk electric system. In this e-book, learn how SilentDefense can help North-American utilities by saving considerable effort and money.

  • A Guide to Simplifying Compliance with NIST SP 800-53 and 800-82

    Sponsored by: Forescout

    NIST Special Publication (SP) 800-53r4 provides a catalog of security controls for federal information systems and organizations and a process for selecting controls to protect operations and organizations. In this resource, explore the provided table which presents NIST SP's security controls applicable to ICS networks.

  • Securing the Critical Industrial Infrastructure

    Sponsored by: Splunk Services UK Ltd

    Awareness of the impact of a breach in the ICS (Industrial Control Systems) and OT (operational technology) environment has risen considerably. Threats to ICS could have severe impacts on the business and reputation of an organization. In this white paper, learn how cyberattacks are affecting both IT and OT networks, including the risks involved.

  • Strengthen Network Security with DNS

    Sponsored by: Farsight Security

    In this webinar, ThreatSTOP Chief Scientist Dr. Paul Mockapetris, the inventor of DNS, and Farsight Security CEO Dr. Paul Vixie, who designed, implemented and deployed several DNS protocol extensions and applications that are used throughout the Internet today, will discuss how you can use DNS to strengthen your network security.

  • Building a Cloud Migration Launchpad: 3 Steps for Network and Security Readiness

    Sponsored by: MASERGY

    Establishing an IT launchpad for cloud migration can help you significantly accelerate the process. In this white paper, learn 3 crucial steps you can take to help prepare your network for cloud migration.

  • The Modality of Mortality in Domain Names

    Sponsored by: Farsight Security

    In this study, Farsight Security monitored an ongoing data feed of newly observed domains (NODs) to generate a cohort data set, and periodically probed those names to determine what happens to them. Learn more about NODs to help your organization create a more secure DNS policy and improve its security posture.

  • Mobile World Congress 2019: The year 5G use cases got real

    Sponsored by:

    In this e-guide we will examine some of the bigger themes that emerged over the course of Mobile World Congress 2019 - which now attracts over 100,000 people every year.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.