ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Guide to Understanding SD-WAN: Security Options in Different Networking Architectures

    Sponsored by: Apcela

    As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.

  • Advanced Evasion Techniques for Dummies

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • The Evolution of Network Access Control

    Sponsored by: Fortinet, Inc.

    In this white paper, learn why security architects should reevaluate network access controls to protect endpoints, users, and the broader organization from the potentially disastrous effects of a device-borne breach.

  • Juniper Connected Security: Dynamic, Adaptive Multi-cloud Security

    Sponsored by: Juniper Networks

    Download this white paper to learn about Juniper Networks' Connected Security framework—which uses dynamic access groups and a unified and intuitive metadata-based policy model that can be ported across clouds—to give security admins complete command and control over their multi-cloud deployments.

  • The 2019 Security Strategy

    Sponsored by: Cloudflare

    How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.

  • The Importance of a Common Distributed Data Services Layer

    Sponsored by: Gigamon

    Read this research report to learn about distributed data services layers, and the critical role they play in enabling a secure distributed network environment, regardless of whether they are physical or virtual.

  • An Introduction to Threat Hunting with Bro Zeek

    Sponsored by: Corelight

    Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.

  • Focus: Network security

    Sponsored by: ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • A Technical Introduction to Bro: Network Security's Best Kept Secret

    Sponsored by: Corelight

    Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.

  • Security Considerations When Undergoing a Network Refresh

    Sponsored by: Hewlett Packard Enterprise

    This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.