ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • IBM Collaboration Software for the Apple iPhone and iPad Devices

    Sponsored by: IBM

    Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.

  • Is the SD-WAN home office here to stay?

    Sponsored by: HPE Aruba Networking

    While VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.

  • How Application Delivery Controllers Have Evolved to Meet New Demands

    Sponsored by: Citrix

    ADCs are physical or virtual devices deployed between applications and users. They intercept session traffic between applications and users and provide a range of functions designed to optimize the end-user application experience. Download this e-guide to learn more about ADCs are how they evolved over the years to meet new demands.

  • Unified Threat Management Guide

    Sponsored by: Sophos

    This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.

  • Bridge the Network Security Gap in IP Multifunction Machines

    Sponsored by: HP Inc

    In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.

  • Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)

    Sponsored by: NEC Corporation of America

    This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.

  • Unified Threat Management Guide

    Sponsored by: Sophos

    This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.

  • Network Project of the Year 2014

    Sponsored by: Talari_DON'T USE

    This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.

  • Securing the SD-WAN: The Next Network Challenge

    Sponsored by: Cisco Umbrella

    How does adopting SD-WAN affect security? Download this expert guide for tips on securing SD-WAN, and find out why security is an essential part of the migration process.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.