ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Barracuda SD-Wan Zero Touch Deployment

    Sponsored by: Barracuda

    Tune into this video for a brief walkthrough of how to use Barracuda CloudGen Firewall to deploy SD-WAN.

  • The Role of DDI in Sase Deployments

    Sponsored by: Infoblox

    The need to re-architect the network has given rise to a flurry of software-defined deployments, but these have proven to bring management and security challenges. However, a new market has recently emerged that tightly couples security with the network: the Secure Access Service Edge (SASE). Download this research report to learn more about SASE.

  • Pioneering DIY retailer future proofs SD-WAN security.

    Sponsored by: Barracuda

    Organizations looking to migrate firewall security, simplify network management, improve visibility, enhance connectivity and regulate traffic would gain much valuable information from this case study. It details a DIY retail chain that faced these challenges and how they were able to overcome them through upgrading their security architecture.

  • The Cisco Umbrella Advantage

    Sponsored by: Cisco Umbrella

    Today, the network perimeter is expanding and blurring. Remote workers are bypassing the VPN and data is bypassing perimeter security. Traditional security just can’t keep up. In this e-book, learn how Cisco Umbrella DNS-layer security can help you see and block threats before they ever reach your network or endpoints.

  • Navigating Today's DDoS Landscape

    Sponsored by: Ixia

    Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.

  • Bridge the Network Security Gap in IP Multifunction Machines

    Sponsored by: HP Inc

    In the following e-guide, experts relay recommendations to secure IP printing and fax devices. Learn where to find guidance on copier and multifunction device security, and how often you should perform vulnerability scans on printers and related systems.

  • Security Considerations When Undergoing a Network Refresh

    Sponsored by: Hewlett Packard Enterprise

    This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • The Evolution of ADC

    Sponsored by: Citrix

    Explore the companies that offer the broadest selection of ADC features, and learn about the evolution of ADCs as demands have changed.

  • Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye

    Sponsored by: FireEye

    With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences