All resources sponsored by:

Fortinet, Inc.

16 Matches
Beyond the Hype: Real-world APT Solution Testing by NSS Labs
sponsored by Fortinet, Inc.
WHITE PAPER:This resource provides a thorough analysis of the Fortinet FortiSandbox 3000D v1.2 breach detection system. It looks at aspects like the effectiveness, performance and TCO of the solution and finds it to be an effective way to detect breaches and breach attempts.
Posted: 07 Apr 2014 | Published: 07 Apr 2014
Get This Now


Why Enterprises Are Really Deploying NGFWs
sponsored by Fortinet, Inc.
WEBCAST:This exclusive webcast takes a look at five organizations that have embraced next generation firewall solutions, examining their motivations for picking those solutions as well as the key requirements they established before making a purchase.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014
Get This Now


NSS Labs:  2013 Next Generation Firewall Security Value Map
sponsored by Fortinet, Inc.
WHITE PAPER:This crucial white paper uses analytical data of the top next generation firewall solution on the market to create a security value map (SVM). Find out which tool offers the most effective services and which best satisfies your organization's specific needs.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
Get This Now


Extending Next Generation Firewalls – Security Leaders must Address Threats from Rising SSL Traffic
sponsored by Fortinet, Inc.
WHITE PAPER:This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.
Posted: 18 Mar 2014 | Published: 18 Mar 2014
Get This Now


The Evolution of the Enterprise…And Enterprise Security
sponsored by Fortinet, Inc.
WHITE PAPER:This exclusive paper examines the technologies that are changing the enterprise and effects that they have on your security environment. Read on and also learn about emerging security trends and requirements that can help keep your organization safe as technologies evolve.
Posted: 14 Mar 2014 | Published: 14 Mar 2014
Get This Now


Internet Security Census 2013
sponsored by Fortinet, Inc.
WHITE PAPER:This guide explores key survey findings regarding increased workplace mobility and how security threats are targeted toward various mobile endpoints.
Posted: 28 Feb 2014 | Published: 31 Dec 2013
Get This Now


Infonetics Research Survey Excerpts
sponsored by Fortinet, Inc.
WHITE PAPER:This guide explores some key network security strategies and how your data center networks can benefit from these upgrades.
Posted: 17 Feb 2014 | Published: 31 Oct 2013
Get This Now


Fortinet's Data Center Solution: Security From the Edge to the Core
sponsored by Fortinet, Inc.
WHITE PAPER:This white paper highlights the features and benefits of a security platform that defends the network core and edge to better protect data centers from today's latest risk factors.
Posted: 14 Feb 2014 | Published: 31 Dec 2013
Get This Now


Web Filtering: An Essential Part of a Consolidated Security System
sponsored by Fortinet, Inc.
WHITE PAPER:In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Posted: 01 Aug 2011 | Published: 29 Jul 2011
Get This Now


A Practical Guide for Beginning the Migration to IPv6
sponsored by Fortinet, Inc.
WHITE PAPER:As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Posted: 01 Aug 2011 | Published: 29 Jul 2011
Get This Now


Controlling Web 2.0 Applications in the Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER:New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling Web 2.0 applications in order to discover and mitigate new hidden security threats.
Posted: 01 Aug 2011 | Published: 29 Jul 2011
Get This Now


FortiGate DoS Protection - Block Malicious Traffic Before It Affects Critical Applications and Systems
sponsored by Fortinet, Inc.
WHITE PAPER:This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization’s network from being used to attack another organization.
Posted: 01 Aug 2011 | Published: 29 Jul 2011
Get This Now


Comprehensive Protection for Email and Web: The World's Most Critical Business Applications
sponsored by Fortinet, Inc.
WHITE PAPER:Email and the web have revolutionized business communication, providing an unmatched blend of reach, scalability, timeliness, efficiency and overall effectiveness.
Posted: 18 Feb 2008 | Published: 01 Dec 2006
Get This Now


Understanding and Detecting Malware Threats Based on File Size
sponsored by Fortinet, Inc.
WHITE PAPER:Malware is typically within files that are less than one megabyte(MB) in size. According to Fortine research, 97% of malware discovered since the beginning of 2006 is below one MB in size.
Posted: 18 Feb 2008 | Published: 01 Dec 2006
Get This Now


Beyond UTM -- The Value of a Purpose-built Network Security Platform
sponsored by Fortinet, Inc.
WHITE PAPER:It is only with a purpose-built network security platform -- as defined by this paper -- that organizations will be assured of maximum security effectiveness, minimum cost of ownership, and the greatest degree of.
Posted: 27 Dec 2007 | Published: 01 Aug 2007
Get This Now


Multi-Layer Security Platforms: The New Definition of Best of Breed
sponsored by Fortinet, Inc.
WHITE PAPER:Significant changes in the threat, technology, and regulatory landscapes are forcing organizations to implement an array of security controls. This white paper explores the benefits of integrating multiple security layers into a single solution.
Posted: 01 Feb 2007 | Published: 01 Jun 2006
Get This Now


16 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement