Research Library

Powered by

Networking Research

  • Bridging the NOC-SOC Divide

    Sponsored by: Fortinet, Inc.

    In this white paper, learn how you can strengthen security by bridging the gap between siloed network operations centers (NOCs) and security operations centers (SOCs) to provide the needed agility, scalability and better use of technical resources.

  • Made for the Cloud: Moving to Unified Communications-as-a-Service

    Sponsored by: West IP Communications

    This white paper walks you through the process of moving to cloud-based unified communications, from pre-planning to ensuring success beyond implementation. Learn about your options in UCaaS and get 5 tips for selecting a cloud UC partner.

  • NPMD for Network Security Forensics

    Sponsored by: Viavi

    Download this white paper to learn about network performance monitoring and diagnostics (NPMD) and network forensics and how they can help strengthen protection against ever-increasing cyberattacks, malware, and internal espionage threats.

  • A Network Operations Guide for Intent-Based Segmentation

    Sponsored by: Fortinet, Inc.

    Download this white paper to learn more about Intent-based Segmentation and how it can help you effectively improve security posture, mitigate risks, and support compliance and operational efficiency—without altering your network architecture.

  • March ezine: Making tracks to SD-WAN growth

    Sponsored by: MicroScope

    SD-WAN is a technology on the rise and there are clearly plenty of channel opportunities out there for those that get a firm grip on deployment and installation

  • Jargon Buster Guide to Container Security

    Sponsored by:

    The definitions and articles in this Jargon Buster will help you understand the business benefits of using containers as well as the potential security pitfalls and most importantly, how to avoid them using the correct tools and approaches.

  • SD-WAN Becomes the Network

    Sponsored by: VMware Velocloud

    This Doyle Research report explores how SD-WAN is positioned to provide critical cloud networking capabilities across corporate, branch, and remote office locations. Plus, learn about a variety of cloud-based WAN use cases, as well as the VMware NSX SD-WAN by VeloCloud and its core features.

  • Neustar Security Solutions Overview

    Sponsored by: Neustar

    Learn about Neustar and their approach to DNS and security. Tap into this resource to find out how you can maintain network performance while tightening security for key areas, like DDoS protection and identity assurance.

  • How 1 Company Improved Team Collaboration with Video

    Sponsored by: Zoom Video Communications

    In this case study, learn about travel search site, Skyscanner, and why they decided to implement Zoom cloud-based video communications when they were in need of a videoconferencing system. Learn how Zoom helped improve team collaboration with HD video quality and higher meeting participant capacity.

  • Moving Video Communications to the Cloud

    Sponsored by: Zoom Video Communications

    Download this white paper to learn about Zoom Video Communications—a cloud-based videoconferencing platform that offers video, audio, and chat communications. Also explore the 10 top reasons for moving away from on-prem communications.

  • How You Can Make Incident Response Faster and More Efficient

    Sponsored by: Corelight

    Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.

  • Network Security & Performance: Mastering a Multi-Cloud Approach

    Sponsored by: 128 Technology

    Learn about 128T's Session Smart Routers and find out how you can operate more efficiently in hybrid and multi-cloud environments by improving network security without hampering app performance.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by:

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • 5 Reasons Corelight Gives You Better Data for Incident Response and Threat Hunting

    Sponsored by: Corelight

    Download this white paper to learn about a product that can give you a holistic view of your network and turn network traffic into high-fidelity data for analysis.

  • Choosing the Right Path to SD-WAN Adoption

    Sponsored by: Burwood

    If you are looking to adopt SD-WAN, the landscape of options can be dizzying. In this guide, discover 6 key questions to ask on the road to SD-WAN adoption to make sure your organization steers in the right direction.

  • Network Traffic Analysis

    Sponsored by: Corelight

    A network IDS typically looks for potential attacks based on monitoring traffic for known behavior or discrete characteristics. But, they often lack the power to identify sophisticated attacks. Read on to discover how your security team could benefit from a networking monitoring framework with sophisticated network traffic analysis.

  • Key Questions to Ask when Evaluating UCaaS Providers

    Sponsored by: Mitel Networks Limited

    In this guide, discover 12 categories – each with a set of targeted questions – that are designed to help you evaluate UCaaS providers and ensure you make an informed decision that will benefit your communications.

  • 7 Questions to Ask When Evaluating SD-WAN Solutions

    Sponsored by: VMware Velocloud

    What should you be looking for from an SD-WAN vendor? Read this analysis from Ashton, Metzler & Associates for 7 questions to ask when evaluating SD-WAN platforms.

  • SD-WAN for Dummies

    Sponsored by: VMware Velocloud

    In this SD-WAN for Dummies e-book, find out how IT and business managers can migrate to a distributed network which is less complex, more flexible, and easier to manage.

  • The SD-WAN Provides the Fast Path to the Virtual Cloud Network

    Sponsored by: VMware Velocloud

    A virtual cloud network (VCN) is designed to allow the branch, public cloud, SaaS, user edge, IoT edge and data center to run on a single, common network with a consistent set of services. Read this 11-page white paper from research analyst Zeus Kerravala for more information on VCN, and why SD-WAN is the best starting point for a VCN.

  • 5 Questions to Ask in Global Network Services RFPs

    Sponsored by: MASERGY

    Download this resource for tips on creating RFPs for global network services, and find out 5 must-have questions to include in your RFP.

  • Global SD-WAN Vendor Market Mid-Year Forecasts, 2018

    Sponsored by: VMware Velocloud

    The SD-WAN market demonstrated consistent growth and maturity throughout 2018. To investigate just how quickly it was growing, Frost & Sullivan conducted research on the state of SD-WAN and its major vendors. Explore their market forecasts for SD-WAN, and find out how vendors like VMware-VeloCloud are helping to foster the technology's growth.

  • Spotlight On The Total Economic Impact Of A Virtual Cloud Network

    Sponsored by: VMware Velocloud

    To understand the benefits, costs, and risks associated with investing in a Virtual Cloud Network, delivered on NSX technology, as a way to bridge your network to the cloud, Forrester Research interviewed 5 VMware NSX customers. Explore Forrester's findings to learn about real life customers' experiences as they modernized their WAN for the cloud.

  • Jargon Buster Guide to Virtualisation

    Sponsored by:

    This jargon buster e-guide will detail everything an enterprise IT manager needs to know about the concept of virtualisation, while also taking a look at what enterprises are doing to build upon this now commonplace bedrock within most enterprise IT estates.

  • Secure WAN Transformation Enables the Modern Digital Enterprise

    Sponsored by: Zscaler

    Read this research paper to explore why organizations are decoupling their network and security, and how their desire to remain efficient and competitive helps drive the adoption of cloud security and SD-WAN.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.