• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | SE | SG | BR
Lang: CN | EN
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • IT Security
flow-image
Sophos

A Managers Guide to Unified Threat Management and Next-Gen Firewalls

Unified threat management (UTM) systems are among the most widely used tools in the information security arsenal. The concept of unified threat management is very appealing: multiple critical security technologies, integrated on a single platform, provided by a single vendor

View More
flow-image
Sophos

Five Stages of a Web Malware Attack

Today’s web attacks are extremely sophisticated and multi-faceted, motivated by a massive underground economy that trades in compromised computers and user information. This paper shows you how modern web attacks work, broken down into five stages, from entry through execution. 

View More
flow-image
VMware

Enrich the Client Experience with VMware Edge Network Intelligence

An AIOps solution for a distributed and secure workplace. Ensures end user and IoT client performance, security, and self-healing through wireless and wired LAN, SD-WAN and SASE. Download the full solution overview to get the details.

View More
flow-image
Code42

Ready-for-HIPAA Sharing in Your Medical Marketplace

Technology plays a critical role in your mandate to improve outcomes and reduce costs. But electronic information sharing can’t come at the expense of your more explicit mandate—to protect patient privacy. The challenge is finding a technology that helps you achieve your goals and stay in compliance. While...

View More
flow-image
A10

Today’s Most Dangerous Security Threats

This paper analyzes the top five most dangerous threats to your data center, namely: DDoS Attacks Web Application Attacks DNS Infrastructure: Attack Target and Collateral Damage SSL-Induced Security Blind Spots Brute Force and Weak Authentication This paper describes the impact of these...

View More
flow-image
Cisco

2014 Annual Security Report

You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed...

View More
flow-image
VMware

Future of SD-WAN for Dummies

SD-WAN is increasingly being used to address a multitude of challenges -- but these use cases only scratch the surface of SD-WAN's potential. Download this whitepaper to explore the future of SD-WAN. 

View More
flow-image
Palo Alto Networks

10 Things Your Next Firewall Must Do

While this paper is focused on the 10 specific things your next (generation) firewall must do, knowledge of the architecture and model as outlined above are prerequisites to understanding the different capabilities of the different products on the market and their ability to deliver these functions. 

View More
flow-image
VMware

Unlock the Power of Hybrid Cloud with Consistent Operations eBook

Embracing a hybrid cloud operating model creates new possibilities for IT organizations, paving the way for cost-effective scalability, flexibility and modernization. However, if your hybrid cloud is a web of disparate environments, tools and processes, this flexibility quickly gets tangled in complexity.  Download...

Published: Jan 14, 2021
View More
flow-image
VMware

SD-WAN for Dummies

This easy-to-read book gives you jargon-free best practices for Software-Defined Wide Area Networking. Includes a special foreword by Lee Doyle, Doyle Research. Co-authored by Dan Pitt, Open Networking Foundation. Download the eBook and learn: The need for SD-WAN adoption for branch networking Benefits...

View More
flow-image
Malwarebytes

Cybercrime tactics and techniques

2019 is off to an action-packed start in cybercrime. From a steadfast increase of pervasive Trojans to a resurgence of randsomare logdged against corporate targets, cybercriminals are going after organizations with a vengence. Read the Cybercrime Tactics and Techniques Q1 2019 Report to learn more about the current state...

View More
flow-image
McAfee

Real Time for McAfee ePolicy Orchestrator

Real Time for McAfee® ePO™ collects McAfee endpoint security product status instantly. This real-time visibility enables you to act on the most recent intelligence, not historical data, helping you to quickly identify and remediate under-protected and noncompliant endpoints. Now you can enhance situational...

View More
flow-image
VMware

Zero Trust Network Access

VMware Secure Access provides enterprises a way for their employees to leverage a secure and fast connection to cloud-based applications and corporate technical resources. Read the eBook to get the full details.

View More
flow-image
Neustar

Four Ways DNS Can Accelerate Business Growth

The emerging Internet needed a phone book, a way to put numbers to names and navigate the web. The numbers were IP addresses, of course, and the names belonged to domains, like Symbolics.com, the very first shingle hung out in cyberspace.

View More
  •  
  •  
  • ...
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2022: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
close icon