ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Load Balancing for High Performance & Availability in the Cloud

    Sponsored by: Cloudflare

    Every year, enterprises lose millions of dollars to site sluggishness and downtime. To address this issue, companies traditionally deployed physical load balancers in data centers, but as computing moves into the cloud, enterprises are gravitating towards cloud-based load balancing solutions. Download this white paper to learn more.

  • Remote Work Cybersecurity: Best Practices & Trends

    Sponsored by: Kaspersky

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • HP TippingPoint Provides Next-Generation Network Security

    Sponsored by: Hewlett Packard Enterprise

    This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.

  • Is the SD-WAN home office here to stay?

    Sponsored by: HPE Aruba Networking

    While VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.

  • Security Considerations When Undergoing a Network Refresh

    Sponsored by: Hewlett Packard Enterprise

    This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.

  • Securing the SD-WAN: The Next Network Challenge

    Sponsored by: Cisco Umbrella

    How does adopting SD-WAN affect security? Download this expert guide for tips on securing SD-WAN, and find out why security is an essential part of the migration process.

  • What to include in an SD-WAN security checklist

    Sponsored by: HPE Aruba Networking

    SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.

  • From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts

    Sponsored by: HP Inc

    In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.

  • Navigating Today's DDoS Landscape

    Sponsored by: Ixia

    Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.

  • Information Security Magazine – July/August 2013

    Sponsored by: TechTarget Security

    This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.