ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Stop Chasing the Wrong Vulnerabilities - An Introduction to Threat-Centric Vulnerability Management

    Sponsored by: Skybox Security

    Learn about threat-centric vulnerability management (TCVM) as a new approach to reduce the risk of attack on your organization, and how TCVM uses the context of your network to accurately determine risk.

  • Check Point and Silver Peak Securing the Internet for SD-WAN

    Sponsored by: Silver Peak

    Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.

  • Why Firewalls Alone Are No Longer Enough

    Sponsored by: VMware

    What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.

  • Top 10 Reasons for Selecting an Array Networks SSL VPN

    Sponsored by: Array Networks

    Discover 10 reasons customers are choosing an Array Networks SSL VPN to provide secure access to remote applications and remote data centers. Build your awareness of next-generation SSL VPNs that are simple yet flexible and scalable yet cost-effective, and designed to drive business productivity while minimizing network exposure.

  • SD-WAN Adoption is Accelerating to Reduce Security Risk

    Sponsored by: Versa Networks

    In this research report, gain valuable insights into how companies manage and secure their network across branch locations. Also, find out the expected benefits and challenges of SD-WAN.

  • Ixia and Gigamon Go Head-to-Head in Processing Performance

    Sponsored by: Ixia

    In this comparison see Ixia's Net Tool Optimizer (NTO) 5288 go up against Gigamon's GigaVUE-HC2 with One GigaSMART Module, comparing: processing performance, deduplication performance, packet loss, and security considerations.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • Advanced Attacks are Catching On - Here's What you can Do

    Sponsored by: Kaspersky Lab

    In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Facing Network Breach Threats, Visibility Is Key

    Sponsored by: Intel

    If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.