ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Software White Papers

  • Microsoft Office 365 Security, SASE, and Zero Trust

    Sponsored by: InteliSecure

    Along with the latest security innovation from Microsoft - Office 365 Security - businesses are considering a SASE platform and zero trust architecture to further push their networks to the edge of security.With these developments, IT professionals are asking, ‘Why is this better than what we have in place?’View this e-book to learn the answer.

  • Less Hackable

    Sponsored by: ThreatLocker

    The problem that many businesses face when trying to secure their cyber environments is that they do not understand the risks involved. In this white paper, gain a better understanding of common cyber risks and learn how those risks can be reduced to an acceptable level.

  • Dutch Insurance Provider Deploys Barracuda Firewalls from Data Unit

    Sponsored by: Barracuda

    Aevitae, a leading Dutch insurance provider company, was not satisfied with any of their existing firewalls solutions. They sought a solution that would provide seamless, end-to-end data visibility across their hybrid environment. In this case study, learn why Aevitae ultimately decided to partner with Barracuda Networks.

  • Reece Group Protects Endpoints and Automates Threat Management

    Sponsored by: BlackBerry

    In this case study, follow the Reece Group, a plumbing equipment supplier with a rapidly expanding number of endpoints, as they partner with Blackberry to address their endpoint security and threat management concerns.

  • Flexible Solutions for a Rapidly Changing Business World

    Sponsored by: Equinix

    Enterprises that may now be fast-forwarding execution of their digital business strategy or quickly putting one in place can do so with the help of Equinix Global Solutions Architects (GSAs). In this brief, take a look at the most common digital concerns that IT leaders have recently faced and explore examples of how Equinix GSAs have helped.

  • Build Online Collaboration and Secure Access for Remote Workers

    Sponsored by: Equinix

    A leading global pain point for many organizations is the need to add capacity from VPN concentrators for employees now working from home. In this brief, learn how Equinix can help enterprises enable thousands of employees working from home to access mission-critical applications and connect with partners and networks to keep business moving.

  • Continuous Authentication as the Zero Trust Multiplier

    Sponsored by: BlackBerry

    The spike in remote work as a result of COVID-19 has all but eliminated the existence of organizational perimeters. Luckily, widely embraced approaches like zero trust serve as a powerful foundation for a robust security strategy. In this article, discover why continuous authentication is the logical next step in zero trust approaches.

  • 5 Reasons your SMB workspace needs simple SSO

    Sponsored by: Citrix

    SSO should make life easier for both IT and employees. But when new apps require different SSO tools from different vendors, it can complicate your IT. Adopting simple, unified SSO for your workspace can ensure secure, anywhere access to all essential applications.This e-book gives five reasons why your organization needs simple, unified SSO.

  • Key Cybersecurity ‘Windows’ You Need to Close

    Sponsored by: Verizon

    Just as small businesses often don't appreciate their overall cyber risk profile, they typically don't grasp exactly how cybercriminals are breaching their data stores through malware. This article indicates exactly which measures must be taken to effectively defend from cybersecurity threats.

  • 10 Best Practices for Internet Security

    Sponsored by: Verizon

    Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.

  • An Introduction to Ranking a Vulnerability’s Priority Based on its Network Context

    Sponsored by: Delve

    To help organizations quantify their vulnerabilities, they need to understand its context within their network. Download this white paper for an introductory look at contextual prioritization, an approach to vulnerability risk scoring that works to understand context and uses that information to identify potential risk areas.

  • Remote Work Cybersecurity: Best Practices & Trends

    Sponsored by: Kaspersky Lab

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • What Characterizes the Best Content Delivery Network (CDN)?

    Sponsored by: Limelight Networks, Inc.

    There is no doubt that choosing your content delivery network (CDN) provider is a key decision for your business. In white paper, uncover insights to help you choose your CDN according to the specific technical capabilities and commercial conditions available in the market.

  • How to Select the Right CDN For Today’s Video Delivery Needs

    Sponsored by: Limelight Networks, Inc.

    In 2020, it’s business as [un]usual which means the need for online video is greater than ever before. To provide the best possible streaming video experience, many organizations engage the services of a CDN. In this white paper, explore a checklist to help you select the right CDN for today’s video delivery needs.

  • Student Cybersecurity 101

    Sponsored by: Cisco Umbrella

    Today’s schools face more security threats than ever before. Sensitive information is at stake, and school districts search for the best ways to protect their students. Through adoption of cloud technologies from Cisco, you can get your security back on track and shift focus back to education. Dive into this e-book to take a closer look.

  • Network Independent Encryption: Flexible, Policy-Based Network Encryption Security for Today’s High-Performance Network Architectures

    Sponsored by: Thales

    Thales is a global leader in the development of end-to-end encryption technologies. Their solutions protect sensitive data for a wide range of commercial, government, industrial and defense customers. Read this white paper to learn more about Network Independent Encryption, the basis of a new technology by Thales called Transport Independent Mode.

  • The State of Zero Trust Security in Global Organisations

    Sponsored by: Okta

    If your organisation is looking to implement a zero-trust security model to one or more parts of your network, then this Okta report is a must-read.Zero trust is beginning to take shape across the globe, and this report reveals details as to where it is being implemented, the industries that are implementing it, and how to build a zero-trust stack.

  • Transitioning Network Security Controls to the Cloud

    Sponsored by: Cisco Umbrella

    Where does IT in North America stand when it comes to moving network security to the cloud? ESG surveyed 376 IT and cybersecurity professionals at organizations in the US and Canada responsible for evaluating, purchasing, and managing network security technology products and services. Read the full report to observe why attitudes may be shifting.

  • Nitro CBRS Private Broadband Support Video Networks

    Sponsored by: Motorola, Inc.

    More and more businesses across the country are turning to video security and analytics to help manage critical operations. However, your video security solution is only as good as the network supporting it. In this white paper, learn how Citizens Broadband Radio Service (CBRS) can help to support your business’ growing video needs.

  • The Maturity of Zero Trust in Europe

    Sponsored by: Okta

    While only 18% of organizations in Europe have a defined strategy along Zero Trust principles, 93% of European organizations polled had implemented at least one security solution that mapped to a Zero Trust strategy. How does your organization compare regarding Zero Trust? View this infographic to learn how Europe is enhancing security.

  • Transforming Detection and Response: A SANS Review of Cortex XDR

    Sponsored by: Palo Alto Networks

    Cortex XDR is a platform designed to help organizations detect and respond to threats. It brings multiple data sources together to assist analysts in performing enterprise investigations. This SANS report found that organizations looking for a holistic view of their environment would benefit from the correlation/response capabilities of Cortex XDR.

  • Businesses at Work (from Home) 2020 Edition

    Sponsored by: Okta

    Organization around the world have reacted to the pandemic quickly, rolling out remote communication apps, extending VPNs, and adding MFA to ensure the productivity, connectivity, and security of their (now) remote workforces. In this report, 2020 Business at Work (from Home), take a closer look at the fastest growing apps and tools.

  • 2020: The State of Endpoint Resilience Report

    Sponsored by: Absolute Software Corporation

    In this research report, 2020: The State of Endpoint Resilience Report, explore insights designed to help enterprises strengthen their security posture, and build the resilience needed to continue to face today’s cyber challenges head on.

  • Identity as a Service for Dummies

    Sponsored by: Okta

    According to the Okta 2020 “Businesses @ Work” report, the average number of apps per organization is currently 88, and the growth rate over the past 3 years has been 21 percent. Using this helpful guide, learn how companies are leveraging IDaaS to make IAM more scalable, more flexible and more cost effective.

  • The Cisco Umbrella Advantage

    Sponsored by: Cisco Umbrella

    Today, the network perimeter is expanding and blurring. Remote workers are bypassing the VPN and data is bypassing perimeter security. Traditional security just can’t keep up. In this e-book, learn how Cisco Umbrella DNS-layer security can help you see and block threats before they ever reach your network or endpoints.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.