Network Hardware Reports

9 essential elements of network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 08 Feb 2021 | Published: 08 May 2020

TechTarget ComputerWeekly.com

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

EMEA Emergency Services eBook Network Technologies Transforming Public Safety
sponsored by Cradlepoint
EBOOK: Emergency services depend on digital and connected technologies to help quickly provide life-saving assistance, deal with emergencies, and bring order to chaotic situations. In this e-book, learn how Cradlepoint helped 5 different emergency service departments stay connected.
Posted: 08 Feb 2021 | Published: 23 Apr 2020

Cradlepoint

From Printer to Recycled PC Risks: Securing Your Organization's Afterthoughts
sponsored by HP Inc
EGUIDE: In this e-guide, IT security pro Nick Lewis discusses the evolving security threat posed by embedded systems on standard enterprise networks, including some recent printer security vulnerabilities. Learn about potential mitigations you can put in place, and get bonus tips on keeping data safe in recycled PC components.
Posted: 14 Nov 2016 | Published: 02 Nov 2016

HP Inc

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

All resources sponsored by Synopsys

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

Is the SD-WAN home office here to stay?
sponsored by HPE Aruba Networking
EGUIDE: While VPN strategies are adequate in many cases, they can't provide the extra level of control, security and management that some companies require for networks that now include home offices. As a result, some organizations have deployed SD-WAN to business-critical home offices. In this e-guide, learn more about SD-WAN home offices.
Posted: 08 Feb 2021 | Published: 15 Dec 2020

HPE Aruba Networking

Gunner Peterson's Security Gateway Buyer’s Guide
sponsored by Intel
WHITE PAPER: Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Intel

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM