Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Solid State Firewall Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Solid State Firewall AppliancesWhite Papers (View All Report Types)
 
Dubai Culture Case Study
sponsored by Dell, Inc.
WHITE PAPER: Access this case study to learn how this institution was able to leverage this technology to build a flexible, scalable private cloud infrastructure that delivers fast internet connectivity.
Posted: 12 Sep 2014 | Published: 28 Feb 2014

Dell, Inc.

Next Generation Firewalls: Here’s What You Need To Know
sponsored by HP and Intel
WHITE PAPER: This expert eGuide breaks down next-generation firewalls, their new features, and the new IT rules that come along with them.
Posted: 19 Sep 2014 | Published: 19 Sep 2014

HP and Intel

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Protecting the Network Perimeter: Controlling what gets through—into and out of your organization
sponsored by McAfee.
WHITE PAPER: The traffic allowed to flow through the network perimeter – both good and bad – can determine the success or potential downfall of an organisation. View this paper to explore how McAfee can help protect network perimeters with a solution that enables organisations to easily, effectively, and securely manage traffic flow.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

McAfee.

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper by Juniper Networks describes the top five networking access control challenges that companies like yours are facing and solutions that they are deploying today.
Posted: 19 Dec 2008 | Published: 01 Apr 2008

Juniper Networks, Inc.

Next-generation firewalls and your security strategy
sponsored by Cisco
WHITE PAPER: This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Cisco

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

Top 5 Considerations for Choosing a Next-Generation Firewall: SonicWALL vs. Palo Alto Networks and Fortinet
sponsored by SonicWALL
WHITE PAPER: Thanks to Web 2.0 and an explosion of Web-based applications, nearly two-thirds of today's traffic is HTTP and HTTPS. Collaboration, increased productivity and improved insights into customers and prospects are all key benefits of Web 2.0.  But with these benefits come new security threats as well as dramatic increases in network bandwidth consumed
Posted: 18 Mar 2011 | Published: 18 Mar 2011

SonicWALL

How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Trend Micro, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement