ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Multimedia

  • Universities, Network Security, and Bro: A Roundtable Discussion

    Sponsored by: Corelight

    Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.

  • A Revolution in Network Security Monitoring Is Underway: Are You Ready?

    Sponsored by: Corelight

    Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a unified, comprehensive visibility approach with tools purpose-built for security teams.

  • A Technical Introduction to Bro: Network Security's Best Kept Secret

    Sponsored by: Corelight

    Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.

  • Security at the Speed of DevOps

    Sponsored by: Cyxtera

    What if there was a way to connect DevOps workloads without the need for manual intervention—ultimately simplifying security infrastructure? Find out how you can do that with Cyxtera's software-defined perimeter (SDP) in this webinar.

  • Siemens on their Secure Cloud Transformation with Zscaler

    Sponsored by: Zscaler

    Watch this brief video to hear insights from Siemens' VP of Global IT Infrastructure, Frederik Janssen about the company's re-architecting of its global hub-and-spoke network to a direct-to-cloud architecture.

  • An Introduction to Threat Hunting with Bro Zeek

    Sponsored by: Corelight

    Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.

  • The Vulnerable Network: How Enhanced Network Access Control Can Help

    Sponsored by: Aerohive Networks

    In this webinar, learn about Secure Access Management (SAM) and how it can help IT organizations address the core issues of device visibility, control and security that are the root cause of most risks and vulnerabilities on the network.

  • Networking and Security: Bury the Hatchet in the Cloud

    Sponsored by: Cisco Umbrella

    In this webinar, learn why joining forces with your networking manager may be the best thing for your security team and cloud migration.

  • "Bro" Open-Source Framework with Alan Saldich

    Sponsored by: Corelight

    In this webcast, listen to Chief Marketing Officer at Corelight, Alan Saldich, talk about the open source software Bro, now known as Zeek. Learn how CoreLight's sensors help enable the large-scale usage of Bro by retrieving and organizing the data you need to track network traffic and performance.

  • PlateSpin Forge: "Plug in and Protect" Disaster Recovery

    Sponsored by: Novell, Inc.

    PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.