ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Network Purchasing Intentions 2012

    Sponsored by: ComputerWeekly.com

    This in-depth research from Computer Weekly and Tech-Target, reveals the IT networking trends and spending priorities for European IT professionals in 2012.

  • Next generation network security

    Sponsored by: ComputerWeekly.com

    In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of several key elements of a modern cyber security strategy.

  • Burnt by a SIEM

    Sponsored by: Arctic Wolf

    Many good teams struggle mightily with SIEM implementation, which typically takes more than 12 months to start delivering value. Inside, learn about painful scenarios due to SIEM weighing you down, and find out how a SOC-as-a-service provider can deliver what SIEM alone can't.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall

    Sponsored by: Riverbed Technology, Inc.

    PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.

  • Building an Application Security Program: Why Education is Key

    Sponsored by: Synopsys

    This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.

  • Cisco Smart Business Architecture

    Sponsored by: Cisco

    This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.

  • Bridge the Network Security Gap in IP Multifunction Machines

    Sponsored by: HP

    In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.

  • Laptop Management for Windows

    Sponsored by: IBM MaaS360

    Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.