Search Results for: Simple Network Management Protocol

Unlocking value in the railway network's data
In this week's Computer Weekly, we find out how the rail industry is working to improve its use of data to deliver bet-ter services to passengers. Is flash the saviour of the storage universe? Our buyer's guide assesses the choices for IT managers. And we examine the failure of the government's Covid-19 contact-tracing app. Read the issue now.

TechTarget ComputerWeekly.com

UNIT 42 Managed Services Threat Report Summary
The MITRE Engenuity Unit 42 team identified a sophisticated attack involving APT10 and BlackCat groups. The report details the attack vectors, malware analysis, and recommendations to enhance your security posture. Read the full report to understand the impact and mitigate the risk of similar attacks.

Palo Alto Networks

You’re Under SIP Attack: Limiting SIP Vulnerabilities
Without the necessary expertise, monitoring, and management, companies could be leaving their network vulnerable to exploitation through their VoIP communications. Read this white paper to understand hackers’ tactics and motivations to help your enterprise operators secure their networks from attack.

TOPICS: .NET
Ribbon Communications

Jargon Buster Guide to Unified Communications
In this e-guide we will explore and define some of the key elements of a UC deployment and offer some insight into some of the emerging trends that are changing the way we communicate in our working lives.

TechTarget ComputerWeekly.com

Password Management Report Unifying Perception with Reality
This report examines the disconnect between password security best practices and actual user behavior. Despite industry recommendations, many still use weak or repeated passwords. Learn how to bridge this gap and improve your password hygiene by reading the full White Paper.

Keeper Security Inc

IT Project: Internet of Things
The internet of things, or IoT, is moving from far-fetched to reality in 2016, and more and more enterprises are taking a serious look at how they can capitalise on this to improve their processes.

TechTarget ComputerWeekly.com

Asset Inventory Solution Comprehensive Visibility Into Your Connected Infrastructure
Asset inventories may seem deceptively simple, but they can make a serious difference when it comes to cybersecurity. The Redjack platform uses non-intrusive software-based network sensors to give you a comprehensive view of your connected infrastructure. Download the full product overview to learn more.

TOPICS: .NET
Redjack

Top 10 networking stories of 2019
Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.

TechTarget ComputerWeekly.com

Workload Communications: Modern zero trust security for cloud workloads on AWS
Legacy security can be inadequate for cloud workloads. To find out how to deliver zero trust security and simple, secure access for your cloud workloads on AWS, check out this product overview.

Zscaler

Sandnet++ – A framework for analysing and visualising network traffic from malware
This article in our Royal Holloway Security Series looks at Sandnet++, a framework for analysing and visualising network traffic from malware

TechTarget ComputerWeekly.com