132 Results for:Network Security

  • Filter by: 

An Introduction to Threat Hunting with Bro Zeek

sponsored by CoreLight Published: 05 Feb 2019 Product Demo

Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt ...

View Now

Network-Powered BYOD - A Case Study in Simplicity

sponsored by SearchSecurity.com Published: 07 May 2013 White Paper

BYOD has already found its way into most higher-education environments. This expert white paper provides insight into how campus-based IT departments can use cloud solutions to bring BYOD under control and truly ...

View Now

A Computer Weekly buyer's guide to perimeterless network security

sponsored by ComputerWeekly.com Published: 05 Feb 2019 eGuide

Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the ...

View Now

How to make the business case for de-perimeterisation

sponsored by ComputerWeekly.com Published: 09 Nov 2010 White Paper

Computing history can be defined in terms of increasing connectivity over time, starting fromno connectivity and developing to the restricted connectivity we currently have today, withislands of corporate ...

View Now

Application security testing: Protecting your application and data

sponsored by SearchSecurity.com Published: 07 Nov 2011 eBook

Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of ...

View Now

CW Enterprise Software case studies

sponsored by ComputerWeekly.com Published: 09 Sep 2013 Case Study

Brian McKenna presents 6 case studies on enterprise software drawn from the winners of Computer Weekly's European User Awards.

View Now

Network Security & Performance: Mastering a Multi-Cloud Approach

sponsored by 128 Technology Published: 07 Feb 2019 White Paper

Learn about 128T's Session Smart Routers and find out how you can operate more efficiently in hybrid and multi-cloud environments by improving network security without hampering app performance.

View Now

Network Security that's Built Right In

sponsored by 128 Technology Published: 11 Feb 2019 White Paper

Learn about a zero trust security model that's designed to help businesses mitigate the risk of cyberattacks by enabling granular network segmentation, policy-based inter-router traffic encryption, fully ...

View Now

E-Guide: Wireless LAN access control: Managing users and their devices

sponsored by SearchSecurity.com Published: 14 Jul 2011 eGuide

This expert E-Guide discusses methods for WLAN access control, including policy creation, device fingerprinting and integration with other network access control solutions.

View Now

A Revolution in Network Security Monitoring Is Underway: Are You Ready?

sponsored by CoreLight Published: 04 Feb 2019 Webcast

Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a ...

View Now