ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • The Importance of a Common Distributed Data Services Layer

    Sponsored by: Gigamon

    Read this research report to learn about distributed data services layers, and the critical role they play in enabling a secure distributed network environment, regardless of whether they are physical or virtual.

  • Using AI to Address Advanced Threats

    Sponsored by: Fortinet, Inc.

    Read this white paper to learn how AI and machine learning can help you improve network security and keep up with the evolving nature of threats by automating and speeding up detection and remediation.

  • Essential Guide: Securing hybrid IT infrastructure

    Sponsored by: ComputerWeekly.com

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

  • Extreme Networks Physical Security Solution

    Sponsored by: Extreme Networks

    This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.

  • Unified Threat Management Guide

    Sponsored by: Sophos

    This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.

  • From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts

    Sponsored by: HP

    In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.

  • 6 Crucial Incident Response Policy Mistakes to Avoid

    Sponsored by: Delta Risk

    Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.

  • Security Gateway Buyer's Guide

    Sponsored by: Intel

    If you’re currently evaluating Security Gateways, this guide will provide the analysis and decision support that will enable you make an informed choice. The following sections of the guide contain tools you can use to identify the right fit for your security architecture based on business requirements, cost, and complexity.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.