ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • How Retailers Use LTE as Wireless WAN to Improve Service & Operations

    Sponsored by: Ericsson

    Innovation is changing retail from the storefront to the back office and beyond. Because of this transformation, IT teams and the enterprise networks they manage have never been more important. In this white paper, explore emerging trends in retail IT and considerations for choosing futureproof edge network solutions for retail.

  • Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato

    Sponsored by: Cato Networks

    The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.

  • Next generation network security

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

  • Focus: Network security

    Sponsored by: TechTarget ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • 9 essential elements of network security

    Sponsored by: TechTarget ComputerWeekly.com

    Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.

  • Five ways SASE and SD-WAN can help improve compliance

    Sponsored by: Hewlett Packard Enterprise

    Security and compliance are top priorities for networking and security teams. With Zero Trust and SASE architectures, the network can become a security solution—improving connectivity experiences and compliance at the same time. Read this paper to learn how.

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: TechTarget ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

  • MicroScope – October 2020: Get in touch with remote network security

    Sponsored by: MicroScope

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

  • Deploying Firewalls throughout Your Organization

    Sponsored by: Cisco Systems, Inc.

    Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.

  • SD-WAN vs. SASE: What's the difference?

    Sponsored by: TechTarget ComputerWeekly.com

    SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. In this infographic, we highlight five key differences between the SASE and SD-WAN that could help businesses choose the right technology for their needs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2025 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.