ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Authentication Protocols White Papers

  • Driving Real Behaviour Change

    Sponsored by: Proofpoint

    There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.

  • Methodology of an IAM Introduction

    Sponsored by: Beta Systems

    IAM projects fail more often than one thinks, but why? Well, sometimes people think too big or too small, or they don't plan at all and often they simply underestimate the complexity of the overall project. For a successful IAM implementation, one must understand all the factors at play. Access this white paper to learn them.

  • Barracuda CloudGen Access

    Sponsored by: Barracuda

    Remote work is here to stay, and cloud migrations are accelerating. This level of risk means organizations must leverage secure access, verifying that only the right people with the right devices and the right permissions have access to company data, apps & infrastructure. In this data sheet, examine Barracuda’s CloudGen Access, a zero-trust tool.

  • 2021 Top Sd-Wan Edge Trends

    Sponsored by: Aruba Networks

    SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • Essential Enterprise Mobile Security Controls

    Sponsored by: SearchSecurity.com

    How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.

  • How IAM Systems Support Compliance

    Sponsored by: Beta Systems

    Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.

  • Why, and how, to merge your SD-WAN and security strategies

    Sponsored by: SearchNetworking.com

    SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.

  • Automation in the Software-Defined Network

    Sponsored by: VMware and Circle IT

    In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.

  • Automation in the Software-Defined Network

    Sponsored by: VMware and Presidio

    In this e-guide, analyst Lee Doyle explains how software-defined networking (SDN) allows today's networks to keep pace with automation and DevOps demands -- leading to lower costs, faster provisioning and better scalability. Also inside, analyst John Burke shares how you can assess the benefits of SDN in your network.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • Just Released: Magic Quadrant for Network Access Control

    Sponsored by: Forescout Technologies, Inc.

    Network access control (NAC) vendors are realizing the necessity of integration with other mobile device management (MDM) and security technologies. When choosing a NAC solution, the ability to integrate is a top concern -- but what else should you consider when evaluating various vendors?

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Redefining Cloud Network Virtualization with OpenFlow

    Sponsored by: NEC Corporation of America

    NEC ProgrammableFlow takes a first step toward end-to-end network-level virtualization with the potential to make a radical impact on how cloud networks are operated, managed and scaled.

  • The CIO's Guide to Mobile Security

    Sponsored by: BlackBerry

    Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.

  • Presentation Transcript: Determining First Network Access Control (NAC) Deployments For Your Organization

    Sponsored by: Bradford Networks

    Learn how different priorities trigger the need for network access control and see examples of how to get NAC up and running in a phased approach.

  • How Does Ping Really Work?

    Sponsored by: Global Knowledge

    The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level.

  • Networking Basics: What You Need to Know

    Sponsored by: Cisco Systems, Inc.

    When looking at networking basics, understanding the way a network operates is the first step to understanding routing and switching. Read this white paper for more.

  • Best Practices in Authentication and Access Control

    Sponsored by: Nevis Networks

    Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.