ComputerWeekly.com Research Library

Powered by Bitpipe.com

Security Devices Research

  • Can a SASE architecture deliver better network performance?

    Sponsored by: TechTarget Networking

    Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.

  • Cisco Smart Business Architecture

    Sponsored by: Cisco

    This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.

  • Top Five DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • Navigating Today's DDoS Landscape

    Sponsored by: Ixia

    Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.

  • Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)

    Sponsored by: NEC Corporation of America

    This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.

  • 4 Questions to Ask When Evaluating Network Security Solutions

    Sponsored by: WatchGuard Technologies, Inc.

    This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.

  • Gunner Peterson's Security Gateway Buyer’s Guide

    Sponsored by: Intel

    Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Extreme Networks Physical Security Solution

    Sponsored by: Extreme Networks

    This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.

  • The Touch-Free Future and Current Adoption Trends of SDN

    Sponsored by: Juniper Networks, Inc.

    There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.