ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Key Principles and Strategies for Securing the Enterprise Cloud

    Sponsored by: Fortinet, Inc.

    In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.

  • Understanding 802.1X and NAC: 3 Problems to Avoid

    Sponsored by: Fortinet, Inc.

    Read guide to review the limitations of the 802.1X standard and/or commercial network access control (NAC) tools when it comes to protecting your network from BYOD and IoT attacks. Also, learn the 3 major problems to avoid when choosing a NAC tool: lack of visibility, lack of control, and lack of automation.

  • A Technical Introduction to Bro: Network Security's Best Kept Secret

    Sponsored by: Corelight

    Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.

  • Check Point and Silver Peak Securing the Internet for SD-WAN

    Sponsored by: Silver Peak

    Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.

  • Focus: Network security

    Sponsored by: ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • How 1 Company Addressed Zero-Day Attacks on 60+ Customer Networks

    Sponsored by: Farsight Security

    LuJam Cyber provides cybersecurity for small and medium organizations, and needed to bring in enterprise threat intelligence to help stop zero-day attacks across their 60+ customer networks. Download this case study to learn how implementing Farsight Security's Newly Observed Domains (NOD) tool helped them prevent more attacks than ever.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs

    Sponsored by: FireEye

    This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.

  • Unified Threat Management Guide

    Sponsored by: Sophos

    This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.