Information Security Research Library

Powered by Bitpipe.com

Network SecurityResearch

  • Get the Most Value Out of Network Security

    Sponsored by: HP and Intel

    This resource introduces a Next Generation Intrusion Prevention System (NGIPS) to keep cyber threats at bay and protect your organization's sensitive information, by reducing cost, frequency and impact of attacks.

  • Promise Healthcare case study

    Sponsored by: Dell Software

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

  • Securing the Small Business Network

    Sponsored by: Dell Software

    This ebook examines eight network security challenges that small businesses face today, and offers easy and effective solutions. Dell SonicWALL offers the comprehensive protection your small business needs, priced within your budget.

  • What to look for when evaluating NGFW

    Sponsored by: Dell Software

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

  • Why threat intelligence is critical for next generation firewalls

    Sponsored by: Dell Software

    A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.

  • Overcoming exploits that use advanced evasion techniques and SSL encryption

    Sponsored by: Dell Software

    To defend against today's advanced attacks, next-generation firewalls must be effective in overcoming obfuscation and advanced evasion techniques, as well as performing comprehensive SSL decryption and inspection.

  • How SMBs can stop Malvertising

    Sponsored by: Dell Software

    Computer users want to find a deal, read celebrity gossip or share personal details with friends. Cybercriminals know how to leverage it. This white paper explains malvertising, and offers five measures for blocking these threats.

  • Beyond next gen firewalls

    Sponsored by: Dell Software

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

  • A Guide to Disaster Recovery in the Cloud

    Sponsored by: Avnet Technology Solutions

    Most organizations know they need to protect their business critical information so that downtime is reduced and people can work.  Buti n the event of outages or failures, many are left in the dark.

  • A Risk Advisor Tool to Keep Hackers at Bay

    Sponsored by: IBM

    Access this resource to discover a FTP risk advisor tool that will assist you in navigating the threat landscape.

  • 2013 Threat Report

    Sponsored by: Dell Software

    This report extensively details and categorizes recent global trends in network threats.

  • EMM Challenges: Three Ways to Balance IT Needs With User Demands

    Sponsored by: BlackBerry

    End-users for mobility rapidly demand more from their network providers.  This puts stress on IT professionals who are already busy dealing with complex security issues and day-today tasks. Read this whitepaper to see how enterprise mobility management is changing.

  • Hardening the network against targeted APT attacks

    Sponsored by: IBM

    The primary foe of security professionals is no longer an asocial teenager basking in the glow of a monitor looking for an easy target, but rather the highly skilled technologists who are deliberately seeking treasure troves of sensitive information.

  • Data Wrapping and User Experience: Two Keys to BYOD Mobile Data Security

    Sponsored by: Bluebox

    This white paper examines a new mobile security solution that avoids the pitfalls of traditional systems by employing data-centric and employee-centric methods.

  • Everything you need to know about MDM, MAM, & BYOD

    Sponsored by: CA Technologies.

    This e-book gives you an expert look at many of the hot mobility trends in organizations today.

  • Security School: Defending Against DDoS Attacks

    Sponsored by: SearchSecurity.com

    This Security School lesson reviews recent cases of DOS attacks, what happened and why, and the lessons you can learn in devising the best DoS defense.

  • Get Ready to Halt Cyber Attacks With IPS In Place

    Sponsored by: HP and Intel

    This case study highlights an intrusion prevention system (IPS) solution that is designed to secure network and critical data with intelligent and adaptive security measures.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • The New Advantages in BES10: What the Latest Update (v10.2) Delivers

    Sponsored by: BlackBerry

    As BYOD and workforce mobility continue to gain traction in today's business world, a unified platform for managing a robust set of devices, applications, and content accross multiple operating systems is a must-have.  This exclusive paper takes a look at one platform that may solve your mobility worries.

  • Mobile Security: Getting Past No to Yes

    Sponsored by: Bluebox

    This webcast reveals how focusing on mobile security can improve your organization, specifically because of the booming emergence of the mobile market.

  • Mitigating Security & Compliance Risks with EMM

    Sponsored by: BlackBerry

    Due to potential threats to enterprise security that come along with workforce mobility, companies are discovering pitfalls from legal, competitive, and productivity standpoints.

  • Firewall Buyers Guide: Evaluate Options Before the Big Decision

    Sponsored by: Sophos, Inc.

    This firewall buyer's guide can help you to identify the right solution for your organization, whether you're looking for an alternative to a network firewall to add enhanced functionality, want to reduce the number of network security products you currently manage, or are in need of more visibility and control over your web users.

  • Key Resource Center on DataCore Software

    Sponsored by: DataCore Software Corporation

    Companies today are increasingly switching to network virtualization as they see the true benefits it's had on companies in the past. However, virtual storage plays a key role in network virtualization, and if your data isn't stored properly it can spell disaster later on.

  • Securing the Internet of Things

    Sponsored by: SearchSecurity.com

    In this Insider Edition, InfoSec pros will learn all about securing the Internet of Things, from determining the nature of the threats to creating an effective IoT security policy.

  • Ballarat Grammar secures BYOD with HP Network Protector SDN Application

    Sponsored by: HP

    BYOD has been a huge trend for industries worldwide, but what about students in schools?  Backed by a protected SDN application, this case study proves its usefulness in education.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

Information Security Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.