ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Hardware Multimedia

  • The Power of our Infrastructure is the Power of your Success

    Sponsored by: TATA Communications

    In this short video, learn more about Tata Communications and their portfolio of solutions which includes managed security, mobility, IoT, network services and more.

  • Cloud Foundation 4, Networking & Security Built In

    Sponsored by: VMware

    One of the key components that VMware have invested in with VMware Cloud Foundation to help drive simplification, consistency and developer experience is built-in networking and security at every layer of the stack. In this webcast, hear from VMware experts as they discuss the networking and security benefits of Cloud Foundation 4.0.

  • ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups

    Sponsored by: Cornerstone OnDemand

    In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.

  • Enabling Distributed Workforce

    Sponsored by: TATA Communications

    As enterprises provision for mass remote work, they are faced with a new range of connectivity, security and collaboration challenges. In this webcast, learn how Tata Communications can help organizations address these challenges.

  • Election System Security Starts at the Network

    Sponsored by: CradlePoint

    There’s a spotlight on cybersecurity that is pushing local, county, and state officials to update and fortify elections systems. Download this webcast to learn how election system security starts at the network.

  • Connecting and Securing the Wireless Edge in Branch Networks

    Sponsored by: CradlePoint

    Branches are undergoing dramatic change. Organizations engage with their customers in new places, such as pop-up branches at large events, temporary seasonal storefronts, and branches inside large box stores. These trends and more have ushered in new requirements for branch networking. Watch this short video to learn more.

  • Cloud-Scale Engineering

    Sponsored by: VMware International Unlimited Company

    In this webcast, learn how VMware and Intel’s co-engineering efforts can help enterprises solve business problems around disaster recovery, security, application development and more.

  • Empowering Your Network with Citrix ADC and Microsoft Azure

    Sponsored by: Citrix

    End users expect a high-quality application experience. This means providing available, secure and reliable access to all your applications. In this video learn how Citrix ADC can help keep your applications available and performing at their best, whether on-premises or in the cloud.

  • Connecting Technologies that Protect First Responders and Communities

    Sponsored by: CradlePoint

    In this video, learn how Cradlepoint can help provide the secure connectivity that first responders including police, fire, and EMS agencies need to leverage critical technologies and access up-to-date information 24x7.

  • SD-WAN Collaboration Demonstration Annotated

    Sponsored by: Oracle Communications

    In this SD-WAN collaboration demonstration, 4 key features are being shown, including: how to access and maintain a multi-cloud scenario, the security you have within the SD-WAN, and 2 more. Download this video to learn more about these features.

  • Best Practices for CIOs to Ensure Business Continuity During This Pandemic

    Sponsored by: Cloudflare

    During this COVID-19 crisis, every CIO’s key goal is to maintain business continuity — enable all employees, customers, partners, and vendors to continue working and collaborating seamlessly. In this webcast, explore the key essentials to ensure business and IT continuity during this crisis.

  • Why You Need Managed SD-WAN

    Sponsored by: Hughes Network Systems

    There are many business drivers for an SD-WAN implementation, but the core reasons include security, bandwidth optimization, network reliability and cloud access. Watch this short video to learn more about these core business drivers and see how HughesON can deliver on them.

  • Global Transit Network Architecture with Azure Virtual WAN

    Sponsored by: Barracuda

    When deployed together, Azure virtual WAN and the Barracuda cloud-gen firewall have the potential to provide powerful and advanced distributed networking with efficient, high-speed cloud connectivity and strength in security. Download this short video to learn more.

  • Deploying SD-WAN Environment with Barracuda

    Sponsored by: Barracuda

    In this short video, walk through the steps to deploying an SD-WAN with Barracuda’s cloud generation firewalls.

  • User Experience at the Edge: Performance Monitoring and Assurance for the Network Edge

    Sponsored by: Accedian

    5G networks are coming, and with them will come massive changes to the number and type of devices connected to the network. This influx of connections means that performance management and security will become increasingly important and complex. In this video, learn how Skylight can help you manage the performance of these new network edge devices.

  • Avoiding Top 3 Security Challenges of Digital Transformation

    Sponsored by: Menlo Security

    In the current business landscape, there’s no doubt that the web is now the most important business tool. Critical systems that were once on-prem are moving to the cloud as a widely trusted alternative. In this webcast, learn about the top 3 security challenges of digital transformation.

  • Research Reveals: Network Security is Converging in the Cloud

    Sponsored by: Cisco Umbrella

    Network security is no longer confined to the data center. Its new address is in the cloud. In this webcast, learn why Gartner is introducing a new market category, the secure access service edge (SASE), which converges security services in the cloud.

  • Replacing FTP Scripts with Managed File Transfer

    Sponsored by: Help/Systems

    Many companies are still using custom scripts or manual processes to exchange information with customers, partners or other locations. And they do it despite the lack of security these methods provide. In this webcast, Stephen Mabbut of HelpSystems discusses why using FTP is a threat to your organization’s cybersecurity.

  • Software Defined Segmentation Done Easily, Quickly and Right

    Sponsored by: Guardicore

    Recently there has been a realization that traditional methods of segmentation like VLANs and Firewalls are not suitable for today’s rapidly changing enterprise environments. In this webinar, Dave Klein of Guardicore discusses everything you need to know about modern software-defined segmentation.

  • SD-WAN and Office 365: What You Need to Know

    Sponsored by: Apcela

    Regardless of what phase of Office 365 adoption you are in, the O365 Network Connectivity Principles always seems to rear its head when performance is not quite what you were expecting. In this webinar, take a look at some of those principles and how technologies like SD-WAN can help (or in some cases hurt) your performance objectives.

  • Application Optimization for SD-WAN

    Sponsored by: Barracuda

    Watch this video for a walkthrough of how to reduce latency and improve cloud app performance in SD-WAN environments using a cloud-based firewall.

  • Barracuda Advance Security for Your SD-WAN

    Sponsored by: Barracuda

    Tune into this video for tactical guidance on how to securely onboard a branch office in an SD-WAN environment.

  • Barracuda Advanced Threat Protection for SD-WAN

    Sponsored by: Barracuda

    Tune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.

  • Barracuda SD-WAN Zero Touch Deployment

    Sponsored by: Barracuda

    Tune into this video for a brief walkthrough of how to use Barracuda CloudGen Firewall to deploy SD-WAN.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.