Hardware  >   Security Hardware  >   Network Security Hardware  >  

Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Security AppliancesWhite Papers (View All Report Types)
 
Protect Your Data Center from Today's Evolving DDoS Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Fortinet, Inc.

Next-Gen Security
sponsored by Dell Software
WHITE PAPER: SSL decryption and inspection keeps attackers away from your data and out of your network. Choose security offerings that can mitigate the most risks. A good NGFW lets you block SSL-encrypted attacks as they happen.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

Next-generation guest network access for GenMobile
sponsored by Aruba Networks
WHITE PAPER: Users today expect to connect from anywhere and giving them high-performance guest access is absolutely essential.  Weak security on the guest network can expose your business to external threats and could cause serious liablility issues.
Posted: 02 Oct 2014 | Published: 02 Oct 2014

Aruba Networks

Who Achieves 100% on NSS Data Center Firewall Security Testing
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive resource analyzes a firewall solution that has passed all stability, reliability, and firewall policy enforcement tests to ensure that your environment is as safe as it can be.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

On-Demand Security Audit and Vulnerability Management - A Proactive Approach to Network Security
sponsored by Qualys, Inc.
WHITE PAPER: This paper explores the various approaches to network security and focuses on the unique role of vulnerability management and automated security audits. Learn about the four pillars of security and different approaches to vulnerability management.
Posted: 07 Nov 2006 | Published: 01 Sep 2006

Qualys, Inc.

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett-Packard Company

Botnets: The dark side of cloud computing
sponsored by Sophos, Inc.
WHITE PAPER: Botnets pose a serious threat to your network and they rival the power of today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. This paper details how to protect against the risk of botnet infection with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos, Inc.

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

Next Generation Data Auditing for Data Breach Detection and Risk Mitigation
sponsored by Tizor
WHITE PAPER: This white paper reviews cases of mass data theft from the data source and provides a best practices approach for protecting your organization's sensitive data and valuable brand equity from a major data breach.
Posted: 26 Jan 2007 | Published: 01 Jan 2007

Tizor
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement