134 Results for:Network Security

  • Filter by: 

MicroScope – May 2018: Bundles deliver surprise package for SMEs

sponsored by MicroScope Published: 01 May 2018 Ezine

An issue looking at the growing attraction of bundles for small customers plus a look at network security issues.

View Now

UK IT Priorities 2016

sponsored by ComputerWeekly.com Published: 23 Jun 2016 eGuide

Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the ...

View Now

IT Security Purchasing Intentions 2013

sponsored by ComputerWeekly.com Published: 30 Nov 2012 Research Content

This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

View Now

Computer Weekly – 29 May 2018: Tech's role in tackling humanitarian crises

sponsored by ComputerWeekly.com Published: 25 May 2018 Ezine

In this week's Computer Weekly, we learn about how mobile connectivity is a lifeline for Syrian refugees in Turkey, thanks to the mobile network operators in that country. And our latest buyer's guide examines how ...

View Now

Network Purchasing Intentions 2012

sponsored by ComputerWeekly.com Published: 30 Jul 2012 Research Content

This in-depth research from Computer Weekly and Tech-Target, reveals the IT networking trends and spending priorities for European IT professionals in 2012.

View Now

Network Security & Performance: Mastering a Multi-Cloud Approach

sponsored by 128 Technology Published: 07 Feb 2019 White Paper

Learn about 128T's Session Smart Routers and find out how you can operate more efficiently in hybrid and multi-cloud environments by improving network security without hampering app performance.

View Now

Tackling Mobile Security and BYOD Risks

sponsored by SearchSecurity.com Published: 11 Jul 2013 eGuide

This expert guide from SearchSecurity.com examines the top risks of mobile security and what BYOD risks your enterprise could encounter, along with how you can rethink network security and take the steps needed to ...

View Now

An Introduction to Threat Hunting with Bro Zeek

sponsored by CoreLight Published: 05 Feb 2019 Product Demo

Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt ...

View Now

A Computer Weekly buyer's guide to perimeterless network security

sponsored by ComputerWeekly.com Published: 05 Feb 2019 eGuide

Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the ...

View Now

How to make the business case for de-perimeterisation

sponsored by ComputerWeekly.com Published: 09 Nov 2010 White Paper

Computing history can be defined in terms of increasing connectivity over time, starting fromno connectivity and developing to the restricted connectivity we currently have today, withislands of corporate ...

View Now