ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Deciphering the Tactics of the Enemy: APT-Style Attacks

    Sponsored by: Dimension Data

    In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.

  • Architecting the Ultimate Control Point - Advanced Cyber Threat Mitigation

    Sponsored by: Intel

    This session looks at applying the complete lifecycle of a Security Architect's job dealing with Web Services Threats and Countermeasures. View Industry security expert Gunnar Peterson develop a Web service Threat model and show how access control and SAML can mitigate spoofing and elevation of privilege attacks.

  • From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts

    Sponsored by: HP

    In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.

  • Deploying Firewalls throughout Your Organization

    Sponsored by: Cisco Systems, Inc.

    Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.

  • 4 Questions to Ask When Evaluating Network Security Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.

  • The Self-Defending Network

    Sponsored by: Cisco Systems, Inc.

    Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.

  • Securing Today’s Mobile Workforce

    Sponsored by: Juniper Networks, Inc.

    BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

  • Advanced Attacks are Catching On - Here's What you can Do

    Sponsored by: Kaspersky Lab

    In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.

  • Survival Guide: Securing Networks without Borders Show

    Sponsored by: Cisco Systems, Inc.

    In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them

  • Navigating Today's DDoS Landscape

    Sponsored by: Ixia

    Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2018 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.