Hardware  >   Security Hardware  >   Network Security Hardware  >  

Appliances

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An appliance or "network appliance" is a term used to denote a relatively low-cost PC designed for Internet access and specialized business use, but without the capabilities of a fully-equipped PC.
AppliancesWhite Papers (View All Report Types)
 
Keeping Your Data Center Ahead of the Curve with New High Performance Solutions
sponsored by Fortinet, Inc.
WHITE PAPER: Explore this informative white paper to find out how to accommodate the evolving security requirements for networks, and take full advantage of the opportunities presented by the latest trends.
Posted: 25 Jul 2014 | Published: 25 Jul 2014

Fortinet, Inc.

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

Demystifying Switch-based ACLs
sponsored by Global Knowledge
WHITE PAPER: This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more!
Posted: 14 Feb 2013 | Published: 14 Feb 2013

Global Knowledge

Thinking inside the Box: Benefits of an Internet Filtering Appliance
sponsored by St. Bernard Software
WHITE PAPER: In this IDC white paper, learn the benefits of an appliance-based Internet filtering solution that provides corporations, government agencies and educational institutions with a cost-effective way of managing Internet access.
Posted: 20 Feb 2006 | Published: 01 May 2004

St. Bernard Software

Network Forensics in a 10G World
sponsored by WildPackets, Inc.
WHITE PAPER: This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

WildPackets, Inc.

The Tangled Web: Silent Threats & Invisible Enemies
sponsored by Symantec Hosted Services
WHITE PAPER: Cyber-criminals can stage attacks on businesses with covert malware, spam, and scams that drain employee productivity. Rich media, open-source platforms and social-networking sites are vulnerable to these threats. Learn how a hosted web security and content filtering service intercepts all types of these web-borne attacks.     
Posted: 03 Mar 2010 | Published: 03 Mar 2010

Symantec Hosted Services

Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER: Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014

Palo Alto Networks

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization
sponsored by McAfee.
WHITE PAPER: The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

McAfee.

Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms
sponsored by ESET
WHITE PAPER: This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology.
Posted: 03 Sep 2009 | Published: 06 Feb 2009

ESET

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement