ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices White Papers

  • WAN Speak Musings – Volume I

    Sponsored by: ComputerWeekly.com

    Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.

  • The Total Economic Impact Of Gigamon

    Sponsored by: Gigamon

    Gigamon commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Gigamon. Access now to uncover a framework to evaluate the potential financial benefit of Gigamon on your organizations.

  • Scaling Network Security

    Sponsored by: Gigamon

    Network speeds continue to increase, putting a strain on security controls that can't scale at the same rate as the networks. Read this research paper to review different network architectures that were designed with security in mind. Also learn about current requirements for today's networks, as well as guidelines for the future.

  • How 1 Company Unified Security Management for Wired and Wireless Networks

    Sponsored by: Aruba Networks

    Daman is a leading specialist health insurer in Abu Dhabi, and was looking for a Network Access Control (NAC) solution to help them comply with a new electronic governmental standard for information security. Learn why Daman chose Aruba and the benefits they've experienced in this case study.

  • The Fight for Full Network Visibility in a Dangerous World

    Sponsored by: APCON, Inc.

    This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.

  • Securing Today’s Mobile Workforce

    Sponsored by: Juniper Networks, Inc.

    BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Top 5 DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • Getting the Most out of your NextGen Firewall

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.

  • Deploying Firewalls throughout Your Organization

    Sponsored by: Cisco Systems, Inc.

    Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.