ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Hardware Research

  • Special report on EMC

    Sponsored by: ComputerWeekly.com

    This 12 page special report from Computer Weekly, updated for 2013, gives you the facts on EMC, its strategy, products and services and financial performance.

  • IT Security Case Studies

    Sponsored by: ComputerWeekly.com

    Warwick Ashford presents 4 critical IT security case-studies selected from the winners of Computer Weekly's European User Awards.

  • CW Special Report on HP

    Sponsored by: ComputerWeekly.com

    This 12 page special report from Computer Weekly gives you the facts on HP, its strategy, products and services and financial performance.

  • The Demise in Effectiveness of Signature and Heuristic Based Antivirus

    Sponsored by: ComputerWeekly.com

    Anti-virus technology is failing to protect organisations from malicious attacks. Security professionals should look at alternative strategies, the NNC group argues in this report.

  • Advanced cyber-security intelligence

    Sponsored by: ComputerWeekly.com

    Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools.

  • Scaling Next-Generation Firewalls with Citrix NetScaler

    Sponsored by: Citrix and Palo Alto Networks

    IT professionals are always looking for new ways to deliver their applications quickly and effectively.This guide outlines next-generation firewalls that can help your network when you need more throughput.

  • MDM for a Secure Mobile Workforce

    Sponsored by: BlackBerry

    This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more.

  • System z, x86, UNIX: Which is more secure?

    Sponsored by: IBM

    Access this comprehensive survey to explore the business impact of different platform architectures -- in particular, their impact on security. Read now to see how IBM's System z, x86, and UNIX stack up in areas such as reliability, security, and total security cost.

  • Enhancing Security with Intel® Trusted Execution Technology

    Sponsored by: Dell, Inc. and Intel®

    This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • Creating the Ultimate Security Platform

    Sponsored by: IBM

    This whitepaper outlines the latest nature of attacks and vulnerabilities in the security landscape and details the capabilities and solutions that must be leveraged to maintain secure operations.

  • Frost and Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award

    Sponsored by: Sourcefire

    In this white paper, learn about the recipient of the Global Intrusion Prevention Systems Product Leadership Award, and how one high-powered security platform stands out in terms of functionality, innovation, acceptance, value, and quality.

  • Computer Weekly – 2 April 2013: The benefits of context-aware security

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we look at context-aware security – a next generation technology that promises to improve corporate information security. As banks implement more short-term fixes to cope with new regulations, we assess the IT implications. And we examine the benefits of executive coaching for CIOs. Read the issue now.

  • Ensuring the security of your mobile business intelligence

    Sponsored by: IBM

    Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices.

  • Enterprise Antivirus Security: How Does Your Solution Stack Up?

    Sponsored by: Webroot

    Thousands of malware attacks occur on a daily basis, and businesses are always searching for a solution to these threats. Inside, access a survey that explores anti-virus solutions and how each measures up. Check out the results to see if your security is up to date.

  • Computer Weekly - 3 April 2012: Data security best practice

    Sponsored by: ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to data security by looking at the changing role of the IT security chief. We also examine why flexible working is proving so slow to roll out and we talk to the UK's air traffic control operator about its ambitious desktop virtualisation project.

  • Computer Weekly - 13 March 2012: The economics of private cloud

    Sponsored by: ComputerWeekly.com

    This week’s Computer Weekly kicks off our Buyer's Guide to private cloud. It also contains our RSA conference coverage of the latest IT security trends and the future for Microsoft's Trustworthy Computing initiative. And we discuss the role of apprenticeships in encouraging more young people to work in IT.

  • Watch It: How to Do Video Surveillance for a Higher ROI

    Sponsored by: Cisco Systems, Inc.

    Video surveillance helps keep an eye on things. But what is its return on investment (ROI) at your business? The technology that you use determines the value you can get. In comparison to cloud-circuit television (CCTV), the increasingly popular digital IP video surveillance offers more ROI. Continue reading this paper to find out why.

  • IP Networking and Its Impact on Video Surveillance

    Sponsored by: NETGEAR Inc.

    Video surveillance is critical for business. Different organizations use video surveillance to protect people’s safety, protect valuable assets, or minimize risks associated with criminal activity. One of the biggest trends in surveillance is the accelerating shift to IP from analog. Read this white paper to learn more.

  • Hardware and Software Authentication: Choosing the Right Approach

    Sponsored by: SafeNet, Inc.

    This paper compares the strengths and weaknesses of hardware and software-based authentication approaches, and offers five key considerations for evaluating which approach is right for the specific needs of your organization.

  • Information Security Magazine, July 09: Controlling Privileged Accounts

    Sponsored by: Information Security Magazine

    This month's cover story is about reigning in privileged accounts such as the UNIX root and Windows Administrator accounts. Regulatory requirements and economic realities are pressuring enterprises to secure their privileged accounts, but how? Also in this issue: Keeping UTM Unified instead of Unnecessary, and more. Read on to learn more.

  • Managed Office Protection: Switching from AV to SaaS

    Sponsored by: Panda Security

    Antivirus products require too much time and effort for small and mid-sized companies. Security as a Service (SaaS) means delivering traditional security applications as an Internet-based service to customers. Now you can focus on your core business, switch from Antivirus to Security as a Service and start enjoying the benefits of SaaS.

  • Cisco ASA 5500 Series Adaptive Security Appliance

    Sponsored by: Cisco Systems, Inc.

    In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.

  • Best Practices in Authentication and Access Control

    Sponsored by: Nevis Networks

    Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.

  • Products of the Year 2006

    Sponsored by: Information Security Magazine

    As spyware becomes increasingly prevalent, antispyware tools are becoming more a necessity than a luxury.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.