ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Using a Software-Defined Network Security Platform

    Sponsored by: Corsa Technology Inc

    When it comes to scaling network security, a vertical approach has usually been adopted, where a bigger device is bought every few years to keep up with the increase in traffic volume. In this white paper, learn about a new way to scale network security using a software-defined networking security platform.

  • Network Visibility and Using "Bro" with Vincent Stoffer

    Sponsored by: Corelight

    Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.

  • AI-Driven Cyber Crime Puts Network Engineering in the Hot Seat

    Sponsored by: Fortinet, Inc.

    Cyber criminals are leveraging AI and agile development techniques to outpace human security analysts and outmaneuver even the newest network defenses. In this white paper, learn different ways to revamp your network security strategy to help keep you protected from an evolving threat landscape.

  • Key Principles and Strategies for Securing the Enterprise Cloud

    Sponsored by: Fortinet, Inc.

    In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.

  • Network Security Tools for GDPR

    Sponsored by: Aruba Networks

    From data protection to network access security control, learn what cybersecurity tools are best positioned to help you anticipate, detect, and eliminate threats so that you can meet GDPR guidelines, even in complex, multi-vendor environments.

  • A Security Approach for Protecting Converged IT and OT

    Sponsored by: Fortinet, Inc.

    Operational technology (OT) networks have traditionally been kept separate from information technology (IT) networks. But as the integration of OT and IT is accelerates, OT networks are more exposed than ever to attacks coming from IT networks. Find out how you can thwart attacks and minimize OT risk with 5 best practices in this white paper.

  • Build a Foundation for Business Growth and Digital Transformation with Secure SD-WAN

    Sponsored by: Open Systems Technologies

    This white paper explores why enterprises are transforming their networks today, and how SD-WAN with integrated security can help you reach your networking goals.

  • HP TippingPoint Provides Next-Generation Network Security

    Sponsored by: Hewlett Packard Enterprise

    This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.

  • 4 Questions to Ask When Evaluating Network Security Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.

  • Advanced Attacks are Catching On - Here's What you can Do

    Sponsored by: Kaspersky Lab

    In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.