Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE:
During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017
|
|
|
Private Connection for The Most Important Tasks
sponsored by StarHub
WHITE PAPER:
Despite recent developments in cloud computing of late, it’s clear for many enterprises that not everything can be run over a public, unstructured network of networks. For some applications, you still need a private point-to-point connection that is robust, secure and mighty fast. In this white paper, learn more about point-to-point connectivity.
Posted: 23 Dec 2020 | Published: 23 Dec 2020
|
|
|
Security Without Compromise
sponsored by Remediant
CASE STUDY:
As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.
Posted: 17 Aug 2020 | Published: 17 Aug 2020
|
|
|
Riverbed SD-WAN: Simple, Powerful, Transformative
sponsored by Riverbed
VIDEO:
Every once in a while, a technology emerges that greatly simplifies how things get done. For IT networking professionals, SD-WAN can be one of those technologies. It can help improve how networks are designed, deployed, and managed. Watch this quick video to learn about the key features of Riverbed’s SD-WAN.
Posted: 10 Mar 2020 | Premiered: 17 Jul 2018
|
|
|
Getting Started with ITIL's CMDB: Best-Practice Tips for Enterprise IT Professionals
sponsored by Enterprise Management Associates (EMA)
WHITE PAPER:
Gain insight into ITIL's CMDB, the drivers for adoption, potential pitfalls on the road to CMDB success, and best-practices guidance to organizations undertaking a CMDB initiative.
Posted: 09 Oct 2006 | Published: 01 Feb 2007
|
|
|
A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE:
Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019
|
|
|
OpenFlow and SDN: What's in Store?
sponsored by Big Switch Networks
EGUIDE:
This expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.
Posted: 05 Aug 2013 | Published: 05 Aug 2013
|
|
|
Built-in Self-test (BIST) Using Boundary Scan
sponsored by Texas Instruments, Inc.
WHITE PAPER:
This document shows how existing architectures can be modified to conform to IEEE 1149.1 architecture.
Posted: 09 May 2000 | Published: 01 Dec 1996
|
|
|
An Introduction to Quantum Lifecycle Management
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE:
This report from The Open Group introduces QLM, explains why it is necessary and how its development and acceptance will be assured.
Posted: 18 Jan 2013 | Published: 05 Nov 2012
|
|
|
E-Book: Standardizing Business Continuity
sponsored by IBM
EBOOK:
Download this e-book, brought to you by SearchCompliance.com, for insights, tips and suggestions for developing an optimal business continuity plan. Read on to learn details of FEMA’s PS-Prep, how to make the case for business continuity, what standard to use, how to measure continuity risk, and much more!
Posted: 15 Dec 2010 | Published: 15 Dec 2010
|
|
|
|
|