ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Burnt by a SIEM

    Sponsored by: Arctic Wolf

    Many good teams struggle mightily with SIEM implementation, which typically takes more than 12 months to start delivering value. Inside, learn about painful scenarios due to SIEM weighing you down, and find out how a SOC-as-a-service provider can deliver what SIEM alone can't.

  • IT Priorities 2014: UK Europe, France and Germany

    Sponsored by: ComputerWeekly.com

    Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.

  • Cloud Transformation Requires New Ways of Thinking

    Sponsored by: Zscaler

    Download this white paper to learn about a program that enables you to shift from a hub-and spoke architecture to an agile, direct-to-internet architecture by delivering the entire gateway security stack as a service.

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • Zscaler: Use Cases for Gateway Security Stack as a Service

    Sponsored by: Zscaler

    Download this white paper to learn how you could shift from a hub-and-spoke architecture to an agile, direct-to-internet architecture by using a gateway security stack as a service.

  • Understanding 802.1X and NAC: 3 Problems to Avoid

    Sponsored by: Fortinet, Inc.

    Read guide to review the limitations of the 802.1X standard and/or commercial network access control (NAC) tools when it comes to protecting your network from BYOD and IoT attacks. Also, learn the 3 major problems to avoid when choosing a NAC tool: lack of visibility, lack of control, and lack of automation.

  • Transform Network Traffic into High-fidelity Logs for Analysis

    Sponsored by: Corelight

    Watch this webinar to learn about an open source framework designed to transform network traffic into high-fidelity logs that summarize activity, and automate traffic analysis to help you focus on finding the attacker.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs

    Sponsored by: FireEye

    This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.

  • Securing Today’s Mobile Workforce

    Sponsored by: Juniper Networks, Inc.

    BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.