ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software Multimedia

  • SD-WAN and Office 365: What You Need to Know

    Sponsored by: Apcela

    Regardless of what phase of Office 365 adoption you are in, the O365 Network Connectivity Principles always seems to rear its head when performance is not quite what you were expecting. In this webinar, take a look at some of those principles and how technologies like SD-WAN can help (or in some cases hurt) your performance objectives.

  • Riverbed SD-WAN: Enabling Cloud Adoption Without Compromise

    Sponsored by: Riverbed

    When it comes to cloud adoption, legacy approaches to networking often force a compromise between business needs for agility and IT’s need to keep assets secure. See how Riverbed SD-WAN can help eliminate this compromise with a simple, yet powerful technology that securely connects your business to your cloud ecosystem.

  • Application Optimization for SD-WAN

    Sponsored by: Barracuda

    Watch this video for a walkthrough of how to reduce latency and improve cloud app performance in SD-WAN environments using a cloud-based firewall.

  • Barracuda Advance Security for Your SD-WAN

    Sponsored by: Barracuda

    Tune into this video for tactical guidance on how to securely onboard a branch office in an SD-WAN environment.

  • Barracuda Advanced Threat Protection for SD-WAN

    Sponsored by: Barracuda

    Tune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.

  • Barracuda SD-WAN Zero Touch Deployment

    Sponsored by: Barracuda

    Tune into this video for a brief walkthrough of how to use Barracuda CloudGen Firewall to deploy SD-WAN.

  • The 2019 Security Strategy

    Sponsored by: Cloudflare

    How are you planning to secure your employees, your company, and your customers in 2019? Watch this webinar to hear from Cloudfare CSO Joe Sullivan on the core strategies he uses to help protect Cloudfare, and—as a result—its 12M domains that rely on it for security and performance.

  • Siemens on their Secure Cloud Transformation with Zscaler

    Sponsored by: Zscaler

    Watch this brief video to hear insights from Siemens' VP of Global IT Infrastructure, Frederik Janssen about the company's re-architecting of its global hub-and-spoke network to a direct-to-cloud architecture.

  • Forrester on Addressing IT Challenges in Today's Mobile World

    Sponsored by: Commvault

    In this webcast, Rachel Dines, senior analyst at Forrester Research, discusses the effect that data growth is having on an ever-changing IT landscape, and how the future will be defined by flexible solutions featuring converged backup and archive.

  • Cisco Prime Network Control System 1.1

    Sponsored by: Cisco Systems, Inc.

    This free 60-day trial software of Cisco Prime Network Control System provides complete lifecycle management of wireless LANs and converged user, access, and identity management to achieve full visibility into endpoint connectivity of your mobile employees.

  • GFI WebMonitor 2012

    Sponsored by: GFI Software

    Having Internet in the workplace – while a necessary feature – can cause two serious challenges: employee inefficiency and security threats. Rather than revoking Internet privileges, discover how you can properly manage and monitor Internet use, preventing these two issues.

  • Application Discovery Tool

    Sponsored by: Sophos

    With the Sophos Application Discovery Tool, you can quickly perform a scan and find the applications installed on your network, both legitimate and unwanted. The tool can be run without uninstalling or deactivating your current anti-virus software.

  • SolarWinds ipMonitor v9.0

    Sponsored by: SolarWinds, Inc.

    ipMonitor delivers out-of-the-box availability monitoring that is ideal for environments with less than 500 devices.

  • GFI EventsManager

    Sponsored by: GFI Software

    GFI EventsManager collects data from all devices that use Windows event logs, W3C, and Syslog and applies the best rules and filtering in the industry to identify key data.

  • Managing Your Network Security with Juniper Networks Flash Demo

    Sponsored by: Juniper Networks, Inc.

    Take a tour of the Juniper Networks NetScreen-Security Manager to see how you can manage integrated FW/VPN devices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.