Hardware  >   Security Hardware  >   Network Security Hardware  >  

Network Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Appliances, Antivirus Appliances, Client Remote Access Appliances, Appliance, Appliances, Encryption Appliances, Web Intrusion Prevention Appliances
DEFINITION: An appliance that combines firewall security, VPN, and traffic management functions.
Network Security AppliancesWhite Papers (View All Report Types)
26 - 50 of 77 Matches Previous Page  | Next Page
DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

The Next Generation of Firewalls: How to Stop Tomorrow's Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

Next-Gen Security
sponsored by Dell Software
WHITE PAPER: SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

What Works in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization
sponsored by FireEye
WHITE PAPER: Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

FireEye

Poison Ivy and Random Access Tools: What You Need to Know
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos, Inc.

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls
sponsored by Palo Alto Networks
WHITE PAPER: This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection.
Posted: 24 Jan 2014 | Published: 12 Nov 2012

Palo Alto Networks

Achieve Network Visibility and Control with Firewall Traffic Classification
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies.
Posted: 24 Jan 2014 | Published: 21 Mar 2014

Palo Alto Networks

A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Unchain Your Network with Application Intelligence and Control
sponsored by Dell Software
WHITE PAPER: Learn about the new risks that organizations face due to the prevalence of Web-based applications, and how to take secure control of applications, data and bandwidth.
Posted: 23 Aug 2013 | Published: 31 Jul 2012

Dell Software

A Foundation for Next-Generation Data Center Security
sponsored by Citrix
WHITE PAPER: This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
Posted: 13 Aug 2013 | Published: 28 Sep 2012

Citrix

Demystifying Switch-based ACLs
sponsored by Global Knowledge
WHITE PAPER: This whitepaper aims to help you better understand switch-based Access Control Lists (ACLs) by exploring what they are used for and how to best utilize them on IOS-based Catalyst devices. View now to learn more!
Posted: 14 Feb 2013 | Published: 14 Feb 2013

Global Knowledge

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

Extreme Networks Physical Security Solution
sponsored by Extreme Networks
WHITE PAPER: This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Frost & Sullivan: Continuous Compliance and Next Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Let's face it, cybercrime is growing and attacks are becoming far more prevalent. This guide explores the role of NAC in securing your network and how it is important to keep your network up-to-date as BYOD and mobility continue to rise.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

ForeScout Technologies, Inc.

Network Forensics in a 10G World
sponsored by WildPackets, Inc.
WHITE PAPER: This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

WildPackets, Inc.

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

The Next Generation IPS
sponsored by HP Enterprise Security
WHITE PAPER: Today’s organizations are faced with the growing challenge of advanced persistent threats (APTs). These attacks are more sophisticated and stealthier, using a variety of techniques to probe and gain access to high-value information. In this paper, uncover how to defend against APTs using a new innovative approach, Next Generation IPS.
Posted: 07 May 2012 | Published: 04 May 2012

HP Enterprise Security

Botnets: The dark side of cloud computing
sponsored by Astaro
WHITE PAPER: Botnets pose a serious threat to your network and business, rivaling the power today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. View this paper to explore how to protrect against the risk of botnets with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

Astaro

Simplifying branch office security
sponsored by Sophos, Inc.
WHITE PAPER: Enforcing consistent network security throughout your enterprise can be challenging—especially for those of you with branch offices with few users and no IT expertise. This paper introduces a new standard — an innovative, unified, cost-effective solution for managing branch office security.
Posted: 06 Apr 2012 | Published: 01 Dec 2011

Sophos, Inc.
26 - 50 of 77 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement