Hardware  >   Security Hardware  >   Network Security Hardware  >  

Network Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Appliances, Antivirus Appliances, Client Remote Access Appliances, Appliance, Appliances, Encryption Appliances, Web Intrusion Prevention Appliances
DEFINITION: An appliance that combines firewall security, VPN, and traffic management functions.
Network Security Appliances White Papers (View All Report Types)
1 - 25 of 78 Matches Previous Page  |  Next Page
ESG Lab Review: Performance and Scalability as Key Firewall Requirements
sponsored by Juniper Networks, Inc.
WHITE PAPER: A key pillar of network security lies in the first line of defense against an unwanted attack: network firewalls. Uncover the most important requirements for data center firewalls, from performance and scale to network segmentation capabilities.
Posted: 25 Aug 2016 | Published: 31 Mar 2015

Juniper Networks, Inc.

Deliver Security Virtually Everywhere with SDN and NFV
sponsored by Juniper Networks, Inc.
WHITE PAPER: Security vendorsĀ are progressing toward secure SDN and NFV rollouts. Read this report and explore approaches and exhibits for adding a layer of security to virtual network infrastructures.
Posted: 23 Aug 2016 | Published: 15 Jul 2016

Juniper Networks, Inc.

Why DDoS Prevention Appliances are So Important Today
sponsored by Arbor Networks
WHITE PAPER: Discover a carefully curated set of key observations, backgrounds, and drivers of the DDoS prevention appliances market, giving a solid overall picture of how the DDoS landscape is changing. Learn how your enterprise can stay ahead of the curve and keep your network safe from these kinds of nefarious attacks..
Posted: 16 Aug 2016 | Published: 13 Jun 2016

Arbor Networks

Networking: You Can't Protect What You Can't See
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn what types of attacker activity are most common and how better visibility helps you identify suspicious network behaviors. Also uncover the "suspicious seven": the top questionable activities that every security team needs to be able to see.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

Cisco Systems, Inc.

PSA Buyer's Guide
sponsored by Autotask Corporation
WHITE PAPER: In this buyer's guide you'll discover a step-by-step process for technology service providers to compete in one of the fastest and most disruptive business environments in the industry.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Autotask Corporation

Your Guide to Secure Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Breaking the Cyber Attack Lifecycle
sponsored by Palo Alto Networks
WHITE PAPER: This white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
Posted: 10 Dec 2015 | Published: 31 Mar 2015

Palo Alto Networks

Understand The Anatomy of Attacks to Stay One Step Ahead
sponsored by OpenDNS
WHITE PAPER: In this white paper, learn the 7 (often repetitive) steps of a cybersecurity attack. View now to learn how to leverage DNS to gain east-west visibility into your network and stop hidden attacks before your data is compromised.
Posted: 08 Oct 2015 | Published: 02 Sep 2015

OpenDNS

Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by vmware airwatch
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage O365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise and accelerate enterprise mobility.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

vmware airwatch

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

Security From the Inside Out: New Breach Defense Strategies
sponsored by Fortinet, Inc.
WHITE PAPER: This resource explains why the traditional perimeter firewall isn't enough and describes how internal segmentation firewalls can help your network react to today's advanced threats. Read on to discover what you need to look for when deciding on an internal segmentation firewall solution.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Fortinet, Inc.

Delivering the NHS Network of the Future
sponsored by Fortinet, Inc.
WHITE PAPER: This resource describes a holistic networking and security solution for NHS organizations that enables you to secure patient data across the network regardless of location. Discover how a single service can deliver high performance and eliminate redundant devices.
Posted: 19 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Uncover Threats in Network Traffic: The Ultimate Guide to SSL Inspection
sponsored by A10 Networks
WHITE PAPER: Don't let hackers evade your network defenses through encrypted traffic. Access this resource and learn ways to gain insight into encrypted data by decrypting inbound and outbound SSL traffic.
Posted: 12 Feb 2016 | Published: 30 Oct 2015

A10 Networks

Validating DDoS Threat Protection
sponsored by A10 Networks
WHITE PAPER: Access this white paper, which contains strategies for protecting the network against the devastating effects of distributed denial of service (DDoS) attacks.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

A10 Networks

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Internal Segmentation Firewall: Protecting Your Network from the Inside Out
sponsored by Fortinet, Inc.
WHITE PAPER: In this brief white paper, you will discover if an internal segmentation firewall is the best form of protection for your users and applications. Learn how to enforce more granular security with policy-based segmentation, and contain threats by user, device, and application.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Fortinet, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.
1 - 25 of 78 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement