ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Hardware Research

  • Limiting malware propagation – a way forward

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Information Security Thesis Series puts forward a suggestion for the creation and implementation of a hypervisor at a layer below the operating system.

  • CW Buyer's Guide to Security Analytics

    Sponsored by: ComputerWeekly.com

    Computer Weekly looks at how organisations are gathering intelligence to stay ahead of emerging threats; the importance of gathering data throughout an incident; and the impact of context-aware security.

  • IT Priorities 2014: UK Europe, France and Germany

    Sponsored by: ComputerWeekly.com

    Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.

  • Special report on EMC

    Sponsored by: ComputerWeekly.com

    This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.

  • IT Security Case Studies

    Sponsored by: ComputerWeekly.com

    Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.

  • CW Special Report on HP

    Sponsored by: ComputerWeekly.com

    This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Sponsored by: ComputerWeekly.com

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • The Fight for Full Network Visibility in a Dangerous World

    Sponsored by: APCON, Inc.

    This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.

  • Cisco Cloud Web Security: Single Interface for Global Control

    Sponsored by: Cisco Systems, Inc.

    This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks.

  • Top 5 Reasons to Choose EMC Isilon for Video Surveillance

    Sponsored by: EMC & Arrow

    Access this concise resource to uncover five top reasons why you should adopt an impressive video surveillance system, so you can gain peace of mind knowing your business is safe and secure.

  • Selecting a Safe and Smart Surveillance Drive

    Sponsored by: Seagate Technology

    Check out this white paper to find a complete guide to selecting a safe and smart surveillance drive that's fully capable of handling the various security applications you may use. Read on and find out which storage controller may be the one that meets your organization's needs.

  • Continuous Cyber Situational Awareness

    Sponsored by: Lumeta Corporation

    This informative paper takes an in-depth look at continuous monitoring, describing how you can successfully deploy the technology and how it can increase visibility and streamline your security management.

  • Cloud Based Application Penetration Testing Trial

    Sponsored by: iViZ

    Inside this resource, unveil your access code for a 15-day trial of a cloud-based application penetration testing solution that combines automated testing with manual validation to provide optimum security monitoring.

  • Scaling Next-Generation Firewalls with Citrix NetScaler

    Sponsored by: Citrix and Palo Alto Networks

    IT professionals are always looking for new ways to deliver their applications quickly and effectively.This guide outlines next-generation firewalls that can help your network when you need more throughput.

  • MDM for a Secure Mobile Workforce

    Sponsored by: BlackBerry

    This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.

  • System z, x86, UNIX: Which is more secure?

    Sponsored by: IBM

    Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.

  • Enhancing Security with Intel® Trusted Execution Technology

    Sponsored by: Dell, Inc. and Intel®

    This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award

    Sponsored by: Sourcefire

    In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.

  • Computer Weekly – 2 April 2013: The benefits of context-aware security

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.

  • Ensuring the security of your mobile business intelligence

    Sponsored by: IBM

    Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.

  • Enterprise Antivirus Security: How Does Your Solution Stack Up?

    Sponsored by: Webroot

    Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.

  • Computer Weekly - 3 April 2012: Data security best practice

    Sponsored by: ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.