Network Security Reports

2021 IT Priorities: APAC report
sponsored by ComputerWeekly.com
EGUIDE: Inside this report, get the complete analysis of the 2021 IT Priorities survey results, as well as insights into enterprises in the region that are accelerating their digital investments to not only survive but thrive in a post-pandemic world.
Posted: 09 Dec 2020 | Published: 10 Dec 2020

ComputerWeekly.com

9 essential elements of network security
sponsored by ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

ComputerWeekly.com

MicroScope – October 2020: Get in touch with remote network security
sponsored by MicroScope
EZINE: In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption
Posted: 01 Oct 2020 | Published: 02 Oct 2020

MicroScope

SD-WAN: Accelerating network transformation in APAC
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read more about SD-WAN's momentum in the Asia-Pacific region, and how the technology can support the requirements of a multi-cloud environment.
Posted: 01 Sep 2020 | Published: 01 Sep 2020

ComputerWeekly.com

IT/OT convergence is necessary, but not so simple
sponsored by ComputerWeekly.com
EGUIDE: This handbook outlines best practices for building a secure IT/OT convergence and integration strategy, as well as insights into why people may just be the most critical piece of the IT/OT convergence security equation.
Posted: 13 Aug 2020 | Published: 14 Aug 2020

ComputerWeekly.com

Royal Holloway: Purple team playbook – threat modeling for security testing
sponsored by ComputerWeekly.com
RESEARCH CONTENT: The reality of information security is that it is impossible to completely ensure that an attacker cannot get into the corporate network. Instead, companies should look at how they prepare and react to security attacks by gaining an understanding of how cyber criminals work by combining the talents of red teams and blue teams
Posted: 14 Jul 2020 | Published: 15 Jul 2020

ComputerWeekly.com

False cents of security: The price of being compromised
sponsored by ComputerWeekly.com
EGUIDE: Trying to guard against everything from frequently phished users to applications with flimsy security, information security professionals are fending off these threats from all angles. Learn more in this infographic about the anatomy of data breach costs and where enterprises are most vulnerable.
Posted: 02 Jun 2020 | Published: 03 Jun 2020

ComputerWeekly.com

CIO Trends India
sponsored by ComputerWeekly.com
EGUIDE: CIOs in India have been put to the test as their organisations implement remote work arrangements amid the Covid-19 pandemic. We look at the impact of the coronavirus outbreak on India's IT industry, why a pandemic specific BCP matters and how CIOs can harden up their datacentre equipment supply chains post-Covid-19.
Posted: 02 Jun 2020 | Published: 03 Jun 2020

ComputerWeekly.com

9 essential elements of network security
sponsored by ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 07 May 2020 | Published: 08 May 2020

ComputerWeekly.com

5G: APAC guide to next-gen mobile connectivity
sponsored by ComputerWeekly.com
EGUIDE: From efforts to turn Malaysia's Langkawi island into a 5G testbed to the impact of the coronavirus outbreak on sales of 5G devices, the guide offers a range of perspectives from different stakeholders in APAC's 5G nascent ecosystem.
Posted: 19 Apr 2020 | Published: 20 Apr 2020

ComputerWeekly.com

MicroScope – April 2020: Seeking sustainability in the channel
sponsored by MicroScope
EZINE: In this issue, we look at sustainability in the channel, with customers increasingly wanting to know that their reseller has a handle on their carbon footprint. Also, read about SCC's insight on mobile working and workforce security, and take a closer look at Riverbed's return to its roots
Posted: 30 Mar 2020 | Published: 01 Apr 2020

MicroScope

Can a SASE architecture deliver better network performance?
sponsored by SearchNetworking.com
EGUIDE: Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com

What to Include in an SD-WAN Security Checklist
sponsored by TATA Communications
EGUIDE: Ensuring security in a software-defined WAN implementation is crucial, but it's often easier said than done. The SD-WAN security equation comprises multiple variables. In this e-guide, uncover 4 different areas where enterprises should consider SD-WAN and security, as well as the core capabilities to include in an SD-WAN security checklist.
Posted: 10 Nov 2020 | Published: 04 Nov 2020

TATA Communications

How IAM Systems Support Compliance
sponsored by Beta Systems
EGUIDE: Many organizations believe that if certain technologies and tools are put in place, processes are reviewed and risk assessments are conducted, they’re compliant. But the reality of compliance goes deeper than simple implementation and review. Read this expert guide to understand the role played by IAM in establishing and maintaining compliance.
Posted: 02 Nov 2020 | Published: 29 Oct 2020

Beta Systems

Why You Should Consider Endpoint Detection & Response
sponsored by Claranet
EGUIDE: Endpoint security has become an especially hot topic over the past few months. Organizations need to put clamps on hackers who attempt to breach their infrastructure. As such, traditional legacy endpoint security systems may not be able to stand up to modern threats. Read this expert guide to learn about endpoint detection & response.
Posted: 10 Sep 2020 | Published: 10 Sep 2020

Claranet

Why you Should Consider SASE for SD-WAN
sponsored by Fortinet, Inc.
EGUIDE: SD-WAN is revolutionizing the way employees connect to their networks. And this is great, but much of what SD-WAN has to offer can be improved with the implementation of a SASE architecture. Dive into this e-guide to get the scoop on why SD-WAN and SASE go together like PB&J.
Posted: 12 Aug 2020 | Published: 06 Aug 2020

Fortinet, Inc.

What to Include in an SD-WAN Security Checklist
sponsored by Citrix
EGUIDE: SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.
Posted: 10 Aug 2020 | Published: 30 Apr 2020

Citrix

Why, and how, to merge your SD-WAN and security strategies
sponsored by SearchNetworking.com
EGUIDE: SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

SearchNetworking.com

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky

Kaspersky Lab’s COVID-19 Relief Initiatives
sponsored by Kaspersky
EGUIDE: Amid the stress caused by the COVID-19 pandemic, it’s nice to know that there are companies out there offering resources and assistance to organizations heavily affected. Download this e-guide to unlock 2 articles highlighting current COVID-19 relief initiatives at Kaspersky Lab.
Posted: 06 Jul 2020 | Published: 29 Jun 2020

Kaspersky

Security Access Controls Over Identities Must Be Priority
sponsored by SearchSecurity.com
EGUIDE: No company should take IAM for granted. Every business faces the potential of a breach, as evidenced by the access control struggles experienced by Amazon Web Services customers. In this e-guide, learn how important a role identity- and access-based security plays in keeping enterprise and individual data safe.
Posted: 12 Jun 2020 | Published: 12 Jun 2020

SearchSecurity.com

Maintaining network infrastructure in a pandemic and beyond
sponsored by SearchNetworking.com
EGUIDE: As workers join video conferences and access corporate resources remotely, they're likely unaware of the network infrastructure that supports those actions -- until something doesn't work. In this e-guide, learn how to prepare your network for an increased number of remote workers.
Posted: 05 May 2020 | Published: 05 May 2020

SearchNetworking.com

How Application Delivery Controllers Have Evolved to Meet New Demands
sponsored by Citrix
EGUIDE: ADCs are physical or virtual devices deployed between applications and users. They intercept session traffic between applications and users and provide a range of functions designed to optimize the end-user application experience. Download this e-guide to learn more about ADCs are how they evolved over the years to meet new demands.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Citrix

Identifying Network Security Vulnerabilities
sponsored by Crosskey Cyber Security
EGUIDE: IT staff needs to regularly review network security vulnerabilities and security gaps to battle rising cybersecurity breaches and keep costs under control through risk assessments. View this guide to learn about tools that can help you identify network security vulnerabilities today.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Crosskey Cyber Security

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com