ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices White Papers

  • Top 10 Reasons for Selecting an Array Networks SSL VPN

    Sponsored by: Array Networks

    Discover 10 reasons customers are choosing an Array Networks SSL VPN to provide secure access to remote applications and remote data centers. Build your awareness of next-generation SSL VPNs that are simple yet flexible and scalable yet cost-effective, and designed to drive business productivity while minimizing network exposure.

  • Building Management Systems: The cyber security blind spot

    Sponsored by: ComputerWeekly.com

    The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.

  • Jump-Start Your Understanding of SD-WAN

    Sponsored by: Telstra

    When it comes to assessing your SD-WAN and business requirements, you'll need to consider security. Learn about a provider that embeds security directly into network architecture in this interactive infographic.

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

  • Insights and Recommendations for Top Security Concerns; Annual Security Report

    Sponsored by: Cisco Systems, Inc.

    This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.

  • Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF

    Sponsored by: F5 Networks

    More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.

  • Cisco Smart Business Architecture

    Sponsored by: Cisco

    This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.

  • Gunner Peterson's Security Gateway Buyer’s Guide

    Sponsored by: Intel

    Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye

    Sponsored by: FireEye

    With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.