133 Results for:Network Security

  • Filter by: 

The Power of Bro and Why You Should Include It in Your Security Infrastructure

sponsored by CoreLight Published: 11 Feb 2019 Video

Tune into this webinar as Matt Bromiley of SANS Institute and Seth Hall of CoreLight explain the power of Bro (now known as Zeek), where it fits in the security landscape and how it can help incident responders do ...

View Now

IT in Europe: Adopting an Application-Centric Architecture

sponsored by SearchSecurity.com Published: 03 Nov 2011 Ezine

Enterprise networking has shifted from focusing on infrastructure to concentrating on the delivery of the applications that help users do their jobs. Uncover how networking professionals view applications and how ...

View Now

Enforcing Endpoint Security: Creating a Network Security Policy

sponsored by SearchSecurity.com Published: 21 Jun 2012 eGuide

As more and more users utilize non-company-owned devices to gain access to corporate data, organizations must take new steps to prevent the risks and damages of hostile, malware-infested and non-compliant endpoints...

View Now

Technical Guide on SIM: Moving beyond network security toward protecting applications

sponsored by SearchSecurity.com Published: 20 Dec 2011 eGuide

SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to ...

View Now

Computer Weekly datacentre case studies

sponsored by ComputerWeekly.com Published: 24 Feb 2014 Case Study

Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.

View Now

Next generation network security

sponsored by ComputerWeekly.com Published: 21 Mar 2018 eGuide

In this e-guide, we explore how network security, while remaining relevant, needs to change in its approach to meet the needs of new technologies and threats. We also look at why it should now be seen as one of ...

View Now

Europe IT Priorities 2016

sponsored by ComputerWeekly.com Published: 23 Jun 2016 eGuide

Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the ...

View Now

Mobile device controls: MDM security features vs. mobile native security

sponsored by SearchSecurity.com Published: 20 Mar 2013 White Paper

When it comes to implementing mobile device management (MDM), not all organizations are the same. Read on to learn how to choose the right approach to MDM for your organization.

View Now

Windows 2012 Server Network Security

sponsored by ComputerWeekly.com Published: 02 Sep 2013 Book

This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and  IPv6. It includes a 30% discount code for Computer Weekly readers.

View Now

ANZ IT Priorities 2016

sponsored by ComputerWeekly.com Published: 06 Jul 2016 eGuide

Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of IT leaders based in Australia and New Zealand, are planning over the next 12 ...

View Now