128 Results for:Network Security

  • Filter by: 

Tackling Mobile Security and BYOD Risks

sponsored by SearchSecurity.com Published: 11 Jul 2013 eGuide

This expert guide from SearchSecurity.com examines the top risks of mobile security and what BYOD risks your enterprise could encounter, along with how you can rethink network security and take the steps needed to ...

View Now

UK IT Priorities 2016

sponsored by ComputerWeekly.com Published: 23 Jun 2016 eGuide

Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the ...

View Now

IT Security Purchasing Intentions 2013

sponsored by ComputerWeekly.com Published: 30 Nov 2012 Research Content

This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

View Now

Application security testing: Protecting your application and data

sponsored by SearchSecurity.com Published: 07 Nov 2011 eBook

Application security testing is critical in ensuring your data and applications are safe from security attack. This e-book, written for IT management, including QA and development managers, explains the basics of ...

View Now

How to make the business case for de-perimeterisation

sponsored by ComputerWeekly.com Published: 09 Nov 2010 White Paper

Computing history can be defined in terms of increasing connectivity over time, starting fromno connectivity and developing to the restricted connectivity we currently have today, withislands of corporate ...

View Now

Winning enterprise software use cases in the Computer Weekly European 2014 Awards

sponsored by ComputerWeekly.com Published: 17 Nov 2014 Case Study

Brian McKenna presents five enterprise software case studies selected from the winners of Computer Weekly's European User Awards 2014.

View Now

Efficacy of Emerging Network Security Technologies

sponsored by ComputerWeekly.com Published: 29 Apr 2013 IT Briefing

The report, which surveyed 4,774 global IT and IT security professionals across nine countries identifies the challenges enterprises are facing dealing with emerging security threats.

View Now

ISM Essentials Guide on Cloud and Virtualization Security

sponsored by SearchSecurity.com Published: 07 Oct 2011 Essential Guide

Moving applications, development and data to the cloud means a new paradigm of IT and security management. You’ll need clear visibility into how data moves outside your organization, where it’s stored and who has ...

View Now

Thwarting Sophisticated Attacks with Today’s Firewalls

sponsored by SearchSecurity.com Published: 17 Feb 2012 eGuide

This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat ...

View Now

IT in Europe: Security in the Cloud

sponsored by SearchSecurity.com Published: 26 Aug 2011 Ezine

Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the ...

View Now