Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

IP VPN Appliances

RSS Feed    Add to Google    Add to My Yahoo!
IP VPN Appliances Multimedia (View All Report Types)
 
PlateSpin Forge: "Plug in and Protect" Disaster Recovery
sponsored by Novell, Inc.
WEBCAST: PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.
Posted: 01 Sep 2009 | Premiered: Sep 1, 2009

Novell, Inc.

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®

Privacy Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Discover the questions you should be addressing while researching a cloud security provider. Listen in to learn key insights such as: don't make assumptions on what security is and isn't included, find out how the provider handles data security and privacy, and more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Intel Security

Forrester Webinar: Taming the Performance Beast
sponsored by Embarcadero Technologies, Inc.
WEBCAST: Smart strategies and tools for database optimization is critical to reduce costs in complex infrastructures and can help organizations defer hardware upgrades, get more out of existing systems, and improve developer and DBA productivity.
Posted: 26 Apr 2010 | Premiered: Apr 26, 2010

Embarcadero Technologies, Inc.

Trusted Computing: Leveraging Hardware Security in 350 Million Platforms
sponsored by Wave Systems Corp.
VIDEOCAST: Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.
Posted: 24 Aug 2010 | Premiered: Aug 24, 2010

Wave Systems Corp.

Workstation Advisor Tool
sponsored by Dell, Inc.
VIRTUAL ENVIRONMENT: This personal advisor tool from Dell is designed to help you define your unique system configurations in order to find the best hardware solution available for your organization.
Posted: 10 Apr 2014 | Premiered: 10 Apr 2014

Dell, Inc.

Top Ways to Enhance Security in 2016
sponsored by Intel
PODCAST: Learn about popular security technologies for 2016 and uncover a brief explanation for many of them. Discover which tools you should be using today and which tools will be popular in the coming year.
Posted: 16 Aug 2016 | Premiered: Mar 30, 2016

Intel

Survival Guide: Securing Networks without Borders Show
sponsored by Cisco Systems, Inc.
WEBCAST: In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

Jason Nolet Details New Solutions for Enterprise
sponsored by Brocade
VIDEO: This brief video uncovers two new network products that will help you adapt to the demands of new applications and ever-changing business requirements.
Posted: 29 Feb 2012 | Premiered: 21 Oct 2011

Brocade

Optimizing for the Cloud with Data Center Virtualization
sponsored by Brocade
WEBCAST: Is your data center ready for cloud computing? Access this resource to learn how you can optimize your infrastructure for the cloud with data center virtualization. Inside, discover how virtualization can make cloud computing a reality, learn how to solve the network bottleneck with more than just hardware, and more.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012

Brocade
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement