IT Management  >   Systems Operations  >   Security  >  

Computer Network Security

RSS Feed   
Computer Network Security Reports
 
Blackberry Cyber Suite
sponsored by BlackBerry
PRODUCT OVERVIEW: In the era of remote work, balancing productivity while adhering to Zero Trust best practices has become difficult. What organizations need is a set of security controls that offer Zero Trust while maintaining a minimally invasive user experience. Read on to learn how BlackBerry is addressing these issues.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

BlackBerry

The CISO's guide to supply chain security
sponsored by ComputerWeekly.com
EGUIDE: Supply chain attacks have long been a concern in cyber security circles as it can be difficult to enforce security measures for suppliers and partners. In this e-guide, find out why supply chain attacks are intensifying amid the pandemic, how companies are responding to the attacks and what else organisations can do to disrupt the cyber kill chain.
Posted: 04 Jul 2021 | Published: 05 Jul 2021

ComputerWeekly.com

The 10 Tenets Of An Effective Sase Solution
sponsored by Palo Alto Networks
WHITE PAPER: This e-book guides you through the top 10 requirements to keep in mind as you look for an effective SASE offering. Download it now to learn about Zero Trust network access, quality of service (QoS), DNS security, and threat prevention.
Posted: 07 Jan 2021 | Published: 07 Jan 2021

Palo Alto Networks

CCNA 200-301 Official Cert: Practice Exam
sponsored by Techtarget
RESOURCE: Achieving your Cisco Certified Network Associate, or CCNA, certification is no small feat. Luckily, searchNetworking is here to help you prepare! We're giving you access to our all new CCNA Practice Exam. Inside, discover 12 questions (and answers) that provide a realistic example of what you can expect on the exam.
Posted: 01 Mar 2021 | Published: 01 Mar 2021

Techtarget

SecurDPS Discover and Classify
sponsored by Comforte AG
PRODUCT OVERVIEW: Data is becoming a highly valuable resource. As such, organizations are taking meticulous precautions in order to safeguard their data against attacks. This solution brief introduces SecurDPS Discover and Classify, designed to automate data discovery and classification to enhance network and data usage visibility – read on to learn more.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Comforte AG

A Computer Weekly e-guide on Network Visibility, Performance and Monitoring
sponsored by ComputerWeekly.com
EGUIDE: Traditional discourse around networks is centred around the basic premise of if you build it they will come. And if they come, they will be able to use the network to its fullest extent and everyone will be happy.
Posted: 08 Oct 2021 | Published: 08 Oct 2021

ComputerWeekly.com

Agentless EDR For Unmanaged Devices
sponsored by Armis
PRODUCT OVERVIEW: As the number of organizations within an environment grows, security teams need a way to identify, manage and secure them. Read this solution brief for a closer look at Armis’ agentless endpoint detection and response (EDR) platform, which provides the visibility, compliance and security requirements needed to address this initiative.
Posted: 14 Dec 2020 | Published: 14 Dec 2020

Armis

National Gas Distributor Achieves Pipeline Visibility
sponsored by Nozomi Networks
CASE STUDY: Midstream oil and gas companies operate within complex environments. Their industrial control systems (ICS) include dozens of equipment types and cover vast distances. This makes it challenging to monitor, manage and secure pipeline systems that aren’t thoroughly documented or easy to visualize.
Posted: 10 May 2021 | Published: 10 May 2021

Nozomi Networks

Why CISOs need advanced network security strategies now
sponsored by SearchSecurity.com
EZINE: Network security has to move beyond the basics. With systems and data under assault by sophisticated attackers, CISOs and other security leaders need to put in place advanced network security strategies that incorporate the latest technologies -- AI, machine learning and more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

SearchSecurity.com

Can a zero-trust approach fill the security perimeter void?
sponsored by SearchSecurity.com
EBOOK: Zero-trust security means more than trusting nothing and no one. It's the best way devised yet to fill the void that the disappearance of the enterprise perimeter left. Learn what steps security pros need to take to implement an effective, zero-trust approach to IT security.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences