Subscribe: Most Popular White Papers and WebcastsNetwork Design and Management Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
application security  application  cisco  expert guide  expert  guide  ibm  learn  mobile  network  published ibm  published  security 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsNetwork Design and Management Research

Most Popular White Papers and Webcasts Network Design and Management Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Tue, 19 Sep 2017 15:35:17 EDT

Last Build Date: Tue, 19 Sep 2017 15:35:17 EDT


Guide to Early Application Testing and Understanding Dev and Ops Responsibilities

Tue, 19 Sep 2017 24:00:00 EDT

Explore the importance of early application security testing. Learn from Owen Garrett, Head of Products for NGINX Inc., while he explains the security risks with containers and developing microservices. Published by: IBM

How to Think like a Hacker to Stop Application Security Threats

Tue, 19 Sep 2017 24:00:00 EDT

Find out how applying the hacker mindset when setting application security standards can help uncover flaws that vulnerability scanners might not recognize. Published by: IBM

How to Secure Mobile Applications in a Private Cloud

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications. Published by: IBM

How to Boost Mobile Application Security

Tue, 19 Sep 2017 24:00:00 EDT

In this expert e-guide, discover ways to boost mobile application security by performing regular assessments to help eliminate an enterprise's vulnerability to data breaches and attacks. Published by: IBM

How to Build an Enterprise Application Security Program

Mon, 18 Sep 2017 24:00:00 EDT

In this e-guide, learn the key steps to building an enterprise application security program to decrease exposure to potential attackers through statics and dynamic application testing. Published by: IBM

The changing role of hardware used in networks in this virtual era

Mon, 11 Sep 2017 24:00:00 EDT

It's far too soon to report the death of network hardware. In a software-defined world, a networking hardware evolution is taking place. Published by:

Understanding your Full Public Key Infrastructure (PKI) Potential

Thu, 31 Aug 2017 24:00:00 EDT

This expert e-guide explores how to utilize KPI to its full-potential across all networks without impacting security. Published by: DigiCert

IT Security Trends to Know

Tue, 29 Aug 2017 24:00:00 EDT

The 2017 TechTarget IT Priorities Survey reports a number of key IT security trends about where enterprises and infosec professionals place their time and resources. In this expert e-guide, get the results from this survey and see how 971 IT pros plan to focus their cybersecurity efforts. Published by: Cisco Umbrella

A CIO's Top Priority

Wed, 30 Aug 2017 24:00:00 EDT

Chances are that you see your role as CIO differently than everyone else in the company. This e-guide will help you gain perspective on what your organization is looking for you to accomplish and how to rearrange your priorities accordingly. Published by: Rainforest QA Inc.

SDN-Lite: The New Way to Reduce Manual Tasks in the LAN

Fri, 01 Sep 2017 24:00:00 EDT

This issue of Network Evolution examines how network pros are using software-defined networking components, centralized management, automation, and policy enforcement to create LANs that are more flexible and easier to integrate. Published by:

Ask the right questions before committing to a colocation SLA policy

Fri, 01 Sep 2017 24:00:00 EDT

Colocation providers offer valuable business continuity services. To avoid disappointment, be sure a service-level agreement sets clear expectations. Published by:

Web Security: Now What?

Fri, 01 Sep 2017 24:00:00 EDT

In this handbook, experts dive into the ongoing issues related to TLS security and HTTPS inspection. Uncover more about the journey of computer worms and how they play a role in advanced persistent threats. Published by:

Cisco Opens Umbrella, a Cloud-based Secure Internet Gateway

Tue, 29 Aug 2017 24:00:00 EDT

Cisco launched Umbrella, a cloud-based secure internet gateway, to tackle cloud and mobile security risks. In this expert e-guide, learn more about this tool, as well as insights into soaring global mobile data traffic. Published by: Cisco Umbrella

Improve Endpoint Security with Advanced Tools and Techniques

Tue, 29 Aug 2017 24:00:00 EDT

Better endpoint security protection is possible with NAC, DLP and other tools and techniques. Access this expert e-guide to learn how they fit together to improve enterprise endpoint protection. Published by: OPSWAT inc

Government IT strategy & challenges in Australia

Wed, 30 Aug 2017 24:00:00 EDT

In this e-guide, you can read more about the challenges that Australia's government is facing in bringing the country's national fibre network up to speed, its plans to push ahead with decryption laws and what it is doing to safeguard critical infrastructure from cyber-attacks. Published by:

How to Find the Best DDoS Attack Prevention and Dection Tools

Tue, 29 Aug 2017 24:00:00 EDT

Explore this expert handbook on how to evaluate DDoS prevention tools and services to identify the best ones for you. Published by:

Three Phases to Automation for Competitive Advantage

Fri, 31 Jul 2015 24:00:00 EDT

In today's rapidly changing world, agility and a lower time-to-market deliver are the key enablers to achieve business advantage. Read on to learn about a three phase automation process to become more efficient and agile, while improving your overall business responsiveness and competitiveness. Published by: VMware

The Crisis of IT Operations & The Journey to Agility

Mon, 28 Aug 2017 24:00:00 EDT

Access this infographic to learn about a three phase process to automating your application and infrastructure delivery and how you stand to benefit. Published by: VMware

How mobile and IoT connectivity is shaping the network of the future

Mon, 28 Aug 2017 24:00:00 EDT

In this e-guide, read about the concept of autonomous self-driving networks, how the IoT connectivity wars are playing out and why Asia is set to dominate industry conversations on 5G. Published by:

Does Your SD-WAN Need an Active-Active Connection?

Fri, 18 Aug 2017 24:00:00 EDT

Most SD-WAN adopters are looking for an active-active connection, but this is not right for every organization. Before you jump into the deep end with SD-WAN, read this e-guide and learn how to assess your network to see if an active-active connection is right for you. Published by: Hughes Network Systems

Why Digital Signing and Verification is Paramount in Cross Domain Environments

Tue, 22 Aug 2017 24:00:00 EDT

Malware targets USB keys and 1 out of every 8 attacks comes via USB. Watch this webcast to uncover how to protect your critical networks against recent portable media threats. Published by: OPSWAT inc

Managing Network Services with New Software-based Offerings

Tue, 15 Aug 2017 24:00:00 EDT

Enterprises looking at the new managed networking services find emerging options and new issues to consider when making the decision. Access your complimentary handbook to managing network services. Published by:

Cyber security solutions from IBM

Fri, 20 Jul 2012 24:00:00 EDT

Government agencies rely on the Internet to store large amounts of data. As a result, internal and external threats are a growing concern for personal and valuable information. This informative white paper offers cyber security solutions to ensure protection. Published by: IBM

Change is the Enemy of Security & Compliance: 10 Questions You Should Ask Yourself about Changes to Your Network

Mon, 02 Aug 2010 24:00:00 EDT

This document lists ten common changes in enterprise environments, all of which can chip away at your security and compliance in ways that you might not realize. Some are obvious; some are subtle; all can have a negative impact. Published by: nCircle

Web Hacking - Network Security Secrets & Solutions

Tue, 09 Jun 2009 24:00:00 EDT

This chapter seeks to outline the scope of the webhacking phenomenon and show you how to avoid becoming just another statistic in the litter of web properties that have been victimized over the past few years. Published by: Bit9, Inc.

Cisco ASA 5500 Series Adaptive Security Appliances

Tue, 09 Jun 2009 24:00:00 EDT

Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details. Published by: Cisco Systems, Inc.