Networking Research Library

Powered by Bitpipe.com

Network SecurityResearch

  • Why and How You Should Use a VPN

    Sponsored by: Global Knowledge

    This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.

  • Mobile Device Management Checklist

    Sponsored by: MobileIron

    A well thought-out mobile device management strategy is a key ingredient for any successful mobility deployment.  This expert E-Guide highlights a mobile device management checklist.

  • Key Benefits of Secure Mobile Intranet Access

    Sponsored by: Fiberlink

    Workforce mobility has caused us to change the way we do business.  Today, mobile workers expect to be able to reach corporate resources from anywhere, as if they were in the office.  This data sheet features a solution that mobilizes SharePoint and many other Intranets.

  • Meet Client Needs While Ensuring Corporate Data and Device Security

    Sponsored by: Fiberlink

    After making the switch from mobile phones to smartphones, companies need an easy-to-use enterprise mobility solution that can ensure device, data, and email security.

  • Proven Practices for Securing Your Website Against DDoS Attacks

    Sponsored by: Dyn

    This expert webcast discusses how DDoS threats and vulnerabilities are impacting your web environment, ultimately creating dangerous risks for your business.

  • Mobile Security: Threats and Countermeasures

    Sponsored by: MobileIron

    Mobile devices are quickly becoming the device of choice for the primary end-user. The intuitive user-experience, robust computing capabilities, extensive catalog of apps, and always-on connectivity combined with portability make mobile devices very compelling PC replacements.

  • Mitigating Web Threats with Comprehensive and Pervasive Security

    Sponsored by: Cisco Systems, Inc.

    This white paper explains the challenges regarding Web security, and explores a solution with a durable network-based security architecture that is designed to protect against malicious threats.

  • Get the Most Value Out of Network Security

    Sponsored by: HP and Intel

    This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

  • Promise Healthcare case study

    Sponsored by: Dell Software

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

  • Securing the Small Business Network

    Sponsored by: Dell Software

    This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

  • What to look for when evaluating NGFW

    Sponsored by: Dell Software

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

  • Why threat intelligence is critical for next generation firewalls

    Sponsored by: Dell Software

    A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.

  • Overcoming exploits that use advanced evasion techniques and SSL encryption

    Sponsored by: Dell Software

    To defend against today's advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.

  • How SMBs can stop Malvertising

    Sponsored by: Dell Software

    Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.

  • Beyond next gen firewalls

    Sponsored by: Dell Software

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

  • A Guide to Disaster Recovery in the Cloud

    Sponsored by: Avnet Technology Solutions

    Most organizations know they need to protect their business critical information so that downtime is reduced and people can work.  Buti n the event of outages or failures, many are left in the dark.

  • A Risk Advisor Tool to Keep Hackers at Bay

    Sponsored by: IBM

    Access this resource to discover a FTP risk advisor tool that will assist you in navigating the threat landscape.

  • 2013 Threat Report

    Sponsored by: Dell Software

    This report extensively details and categorizes recent global trends in network threats.

  • Control Network Security with a New Approach to Malware Defense

    Sponsored by: Hewlett-Packard Company

    This brief highlights a solution that integrates next-generation firewalls with intrusion prevention to create a barrier against harmful malware.

  • EMM Challenges: Three Ways to Balance IT Needs With User Demands

    Sponsored by: BlackBerry

    End-users for mobility rapidly demand more from their network providers.  This puts stress on IT professionals who are already busy dealing with complex security issues and day-today tasks. Read this whitepaper to see how enterprise mobility management is changing.

  • A Guide to Improving Your Network Security in 30 Days

    Sponsored by: Hewlett-Packard Company

    This resource highlights a NGFW solution combined with intrusion prevention to cure your network security issues.

  • Securing Your IT Infrastructure with SOC/NOC Collaboration

    Sponsored by: Hewlett-Packard Company

    Get help seamlessly integrating log management into IT operations to effectively integrate SOC and NOC, empowering your organization to effectively manage your IT infrastructure while simultaneously ensuring its security.

  • A Universal Log Management Solution

    Sponsored by: Hewlett-Packard Company

    In this white paper, explore a universal log management solution that consolidates log data from security, compliance audit, IT operations, and application development teams to provide clear visibility to improve troubleshooting abilities.

  • Hardening the network against targeted APT attacks

    Sponsored by: IBM

    The primary foe of security professionals is no longer an asocial teenager basking in the glow of a monitor looking for an easy target, but rather the highly skilled technologists who are deliberately seeking treasure troves of sensitive information.

  • Data Wrapping and User Experience: Two Keys to BYOD Mobile Data Security

    Sponsored by: Bluebox

    This white paper examines a new mobile security solution that avoids the pitfalls of traditional systems by employing data-centric and employee-centric methods.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Networking Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.