ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

  • Check Point and Silver Peak Securing the Internet for SD-WAN

    Sponsored by: Silver Peak

    Explore how to use SD-WAN to enable enterprise WAN networks to be built using broadband Internet service along with MPLS as the underlying transport, and find out how you can integrate security throughout your SD-WAN.

  • The Importance of a Common Distributed Data Services Layer

    Sponsored by: Gigamon

    Read this research report to learn about distributed data services layers, and the critical role they play in enabling a secure distributed network environment, regardless of whether they are physical or virtual.

  • Focus: Network security

    Sponsored by: ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • Securing Applications in the Cloud

    Sponsored by: Cloudflare

    In this white paper, explore a network security tool designed to help you remain secure and 'always-on' by providing intelligent security at scale, and layered defenses to protect against DDoS, data theft and malicious bots.

  • Unified Threat Management Guide

    Sponsored by: Sophos

    This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.

  • Security Gateway Buyer's Guide

    Sponsored by: Intel

    If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity.

  • 5 Steps to Network Situational Awareness

    Sponsored by: Lumeta Corporation

    This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.

  • Extreme Networks Physical Security Solution

    Sponsored by: Extreme Networks

    This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.