Network Security Devices White Papers

(View All Report Types)
Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos

Securing Today’s Mobile Workforce
sponsored by Juniper Networks, Inc.
WHITE PAPER: BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation