Research Library

Powered by

Security Devices Research

  • Cisco Smart Business Architecture

    Sponsored by: Cisco

    This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.

  • The Self-Defending Network

    Sponsored by: Cisco Systems, Inc.

    Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.

  • Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention

    Sponsored by: Palo Alto Networks

    Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.

  • Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF

    Sponsored by: F5 Networks

    More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.

  • Insights and Recommendations for Top Security Concerns; Annual Security Report

    Sponsored by: Cisco Systems, Inc.

    This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Zero Day to Real-Time: How to combat real-time cybercrime with community threat intelligence

    Sponsored by: Intel Security

    Cybercrime's new techniques demand a new weapon. Read this white paper to learn how this real-time network integrates threat disciplines and introduces new detection and response models that will provide effective protection as the malware wars escalate.

  • Gunner Peterson's Security Gateway Buyer’s Guide

    Sponsored by: Intel

    Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • Validating DDoS Threat Protection

    Sponsored by: A10 Networks

    Access this white paper, which contains strategies for protecting the network against the devastating effects of distributed denial of service (DDoS) attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.