Security Think Tank Pt.1 - 2020 bought us universal remote working. So what next?...
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide: Each month Computer Weekly poses a question to its Security Think Tank, a panel of cyber security experts comprising industry insiders, technologists, analysts, legal experts and educators, to share their years of collective cyber security wisdom with the security community.
Posted: 15 Mar 2021 | Published: 19 Feb 2021
|
|
|
Computer Weekly – 10 December 2024: On the road to change at Aston Martin
sponsored by TechTarget ComputerWeekly.com
EZINE:
In this week's Computer Weekly, we talk to Aston Martin's CIO to find out how tech is helping tackle the challenges facing the automotive sector. The new National Cyber Security boss explains the need to be vigilant against growing online threats. We also examine the future of secure remote connectivity in the cloud era. Read the issue now.
Posted: 10 Dec 2024 | Published: 10 Dec 2024
|
|
|
A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 08 Feb 2021 | Published: 05 Apr 2019
|
|
|
Cisco 1800 Series Integrated Services Routers Fixed Configuration Models
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING:
The Cisco® 1800 Series integrated services routers intelligently embed data, security, and wireless technology into a single, resilient system for fast, secure, scalable delivery of mission-critical business applications.
Posted: 10 Jul 2008 | Published: 01 Jan 2007
|
|
|
Network Access Control: User and Device Authentication
sponsored by Intel Corporation
WHITE PAPER:
Networking has evolved to support both wired and wireless access, securing corporate networks from attack is even more essential. This white paper discusses how your organization can authenticate users and devices before they connect to the network.
Posted: 31 Aug 2007 | Published: 01 Aug 2005
|
|
|
Stopping Inbound and Outbound Threats: Juniper Networks Firewall/IPSec VPN with Unified Threat Management (UTM)
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE:
Juniper Networks firewall/VPN appliances include UTM features that are backed by world class technology partnerships.
Posted: 06 Oct 2008 | Published: 03 Oct 2008
|
|
|
Patch Tuesday Alerts
sponsored by Lumension
PRESS RELEASE:
Each Tuesday, Lumension Security reviews the Microsoft Security Bulletins and provides specific comments, recommendations and key considerations to help customers implement the latest round of security updates as quickly and effectively as possible.
Posted: 11 Jul 2008 | Published: 01 Jul 2008
|
|
|
Cisco 870 Series Integrated Services Routers for Small Offices
sponsored by Cisco Systems, Inc.
SOFTWARE LISTING:
The Cisco 850 and Cisco 870 series routers support a secure, affordable, and easy-to-use wireless LAN solution that combines mobility and flexibility with the enterprise-class features required by networking professionals.
Posted: 10 Jul 2008 | Published: 01 Jan 2005
|
|
|
Exploiting IT Networks to Create Sticky Services
sponsored by Alcatel-Lucent
WHITE PAPER:
This paper has examined the kinds of sticky services deployable today over advanced IP networks.
Posted: 15 Jan 2008 | Published: 01 Jan 2008
|
|
|
Collaboration solutions: Solutions for small and medium business
sponsored by IBM
RESOURCE CENTER:
Check out this IBM resource center to identify collaboration software solutions specifically geared towards small and medium-sized businesses.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|