Hardware  >   Security Hardware  >   Network Security Hardware  >  

Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Security Appliances White Papers (View All Report Types)
 
8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Laptop Management for Windows
sponsored by IBM MaaS360
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM MaaS360

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

7 Key Reasons to Implement an Identity Aware Network
sponsored by Applied Identity
WHITE PAPER: This paper provides you with insight into the seven key reasons why internal networks are migrating towards an identity and role based infrastructure to provide a more effective and cost efficient method for securing critical business assets.
Posted: 26 Mar 2008 | Published: 01 Mar 2008

Applied Identity

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

Dell, Inc.

Controlling Botnets with the Next-Generation Firewall
sponsored by Palo Alto Networks
WHITE PAPER: View this paper for an overview of botnets and how they work; and uncover a model that can enable enterprises to proactively protect themselves with the unique capabilities of next-generation firewalls.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

Palo Alto Networks

Manage Physical Access Control within a Virtual Server Environment
sponsored by RedCloud Security
WHITE PAPER: Explore how to manage physical access control within a virtual server environment. View this data sheet to uncover RedCloud Virtual, a web-based, access control virtual appliance that allows organizations to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

RedCloud Security

Thinking inside the Box: Benefits of an Internet Filtering Appliance
sponsored by St. Bernard Software
WHITE PAPER: In this IDC white paper, learn the benefits of an appliance-based Internet filtering solution that provides corporations, government agencies and educational institutions with a cost-effective way of managing Internet access.
Posted: 20 Feb 2006 | Published: 01 May 2004

St. Bernard Software

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement