Windstream Site Search

Search Results For: ' Category:network security'

Default Tech Article Cyber Threat Cheat Sheet Checklist

The Cyber Threat Cheat Sheet Checklist is your A to Z guide with descriptions and definitions for today’s most common network security threats that threaten your enterprise’s most valuable asset—business information.

Smarter-Approach-for-DDos.png A Smarter Approach For Combating Distributed Denial-of-Service Attacks White Paper

As DDoS attacks become more prevalent, focused and severe, organizations need to consider new options to protect their infrastructure, applications and data.

resrc-icon-access-diversity.png Access Diversity Brochure

What impact would an access link outage have on your business? Learn how Windstream Access Diversity options provide network resiliency and failover, enabling business continuity with an ideal balance of cost, bandwidth and availability.

Hosted Email Security Th Hosted Email Security Fact Sheet

Windstream’s Hosted Email Security cloud-based service is the easy, cost-effective and efficient way to tackle your organization’s email security needs. As a hosted solution, there is no hardware to buy, no software to install and no maintenance to perform.

togo-casestudy.png Togo's Case Study

Togo's, the fast-growing West coast sandwich chain, understands that keeping customer data safe is critical to maintaining a strong brand reputation. Facing booming franchise opportunities, Togo's needed a comprehensive and cost-effective solution to enforce and manage PCI compliance across their fr…

resrc-icon-managed-security-user-guide.png Managed Network Security Web Portal User Guide

This User Guide introduces the Managed Security Web Portal to guide you through the portal layout, web filtering administration and SSL VPN use administration with instructions for applying changes and administering multiple devices.

resrc-icon-mngd-network-security.png Managed Network Security Brochure

Network security ia a fundamental requirement for all businesses today. The growing number and complexity of security threats requires a highly skilled team of security professionals, seamlessly integrated with a layered defense plan to protect against hackers, malware and other threats in the virtu…

Win Ebook 82X70 The True Cost of a Cyber Attack eBook

Recouping lost revenue due to malicious hackers may be easier than determining how many future business opportunities are lost due to the lasting damage your company’s reputation. Learn more about the true cost of cyber attacks.

resrc-icon-govt-comm-technology.png Government Communications Technology Brochure

Federal agencies are consistently stretched to meet demands for the security and scalability of our nation’s most critical operations—even in times of crisis. Learn how Windstream can help meet those requirements, while also enabling agencies to minimize costs and enhance reliability and flexibility…

Hosted Web Security Th Hosted Web Security Fact Sheet

Windstream’s Hosted Web Security cloud-based service is a cost-effective and efficient way to implement a Web filtering policy, while taking advantage of added layers of threat mitigation to maximize your organization’s Web browsing security

Default Tech Article Network Assessment Checklist

The pressure on your healthcare IT network today is intense. Clinicians need to securely connect, collaborate and communicate on demand, no matter where they happen to be.

resrc-icon-case-study.png Building a Foundation for Growth Case Study

Founded in California, a major building product distributor grew from 28 locations in 2013 to over 200 and counting. To ensure that it could provide consistent, top-notch customer service to all its customers at all its locations, the company turned to Windstream to harmonize its ever-expanding netw…

Showing 1-20 of 40 results. Search completed in 0.006 seconds.


You can broaden your search by clicking to remove some filters.