132 Results for:Network Security

  • Filter by: 

Desktop Admin for BYOD: Security Chapter

sponsored by SearchSecurity.com Published: 21 Feb 2013 White Paper

The risk presented by BYOD should not prevent companies from taking advantage of its benefits, including flexibility and cost savings.  Inside, learn how to clearly define your BYOD security strategy and get the ...

View Now

Network Security: Spotlight on Australia/New Zealand

sponsored by ComputerWeekly.com Published: 21 Jun 2018 eGuide

In this e-guide learn more about how security leaders are turning to AI to take out the bad guys, how blockchain can help secure an IoT network, and whether network security strategies are keeping up with emerging ...

View Now

Technical Guide on SIM: Moving beyond network security toward protecting applications

sponsored by SearchSecurity.com Published: 20 Dec 2011 eGuide

SIMs have been widely adopted for their value in correlating, reporting and alerting on network security. But SIMs can be used for more than just network security monitoring. The same tools can also bring value to ...

View Now

Voice Cloud Security

sponsored by Intermedia Net Published: 30 Mar 2018 White Paper

Are you considering moving your business communications to the cloud, or upgrading your current VoIP service, but worried about the level of security you will get? Read this except from Intermedia's technical white...

View Now

Computer Weekly datacentre case studies

sponsored by ComputerWeekly.com Published: 24 Feb 2014 Case Study

Jim Mortleman takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.

View Now

Windows 2012 Server Network Security

sponsored by ComputerWeekly.com Published: 02 Sep 2013 Book

This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and  IPv6. It includes a 30% discount code for Computer Weekly readers.

View Now

ANZ IT Priorities 2016

sponsored by ComputerWeekly.com Published: 06 Jul 2016 eGuide

Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of IT leaders based in Australia and New Zealand, are planning over the next 12 ...

View Now

Case Study: Global Law Firm Unlocks New Threat Hunting Capabilities

sponsored by Corelight Published: 25 Jan 2019 Case Study

When an international law firm wanted to expand its threat hunting capabilities through analysis technique with network visibility, they decided on Bro Network Security Monitor. However, after realizing they ...

View Now

Shake the Box: How to Get Encrypted Traffic Insights Without Decryption

sponsored by Corelight Published: 21 May 2019 White Paper

The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source...

View Now

Case Study: How Corelight Cured an Energy Company's SOC of a Serious SMB Headache

sponsored by Corelight Published: 25 Jan 2019 Case Study

One of the world's largest energy companies was searching for a network traffic analysis tool that could provide real-time visibility across multiple offices. In this case study, read about how company decided on a...

View Now