Hardware  >   Security Hardware  >   Network Security Hardware  >  


RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An appliance or "network appliance" is a term used to denote a relatively low-cost PC designed for Internet access and specialized business use, but without the capabilities of a fully-equipped PC.
Appliances Reports
Deploying a Next-Gen Platform for Managed Security Service Providers (MSSP)
sponsored by Palo Alto Networks
CASE STUDY: This case study explains how to reduce your security operating expenses by 50% by upgrading your network security services into the cloud. Learn how to onboard customers seamlessly and deliver faster service for your customers.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Palo Alto Networks

IntralinksĀ® Information Rights Management
sponsored by IntraLinks, Inc
DATA SHEET: Access this data sheet to learn about an Information Rights Management tool that can secure your content.
Posted: 30 Apr 2015 | Published: 31 Dec 2014

IntraLinks, Inc

Report on App, Platform and Device Preferences from Mobile Security Experts
sponsored by Good Technology
WHITE PAPER: Access this report for details on app, platform, and device preferences as analyzed by mobile security experts, and the methodologies behind them.
Posted: 25 Nov 2015 | Published: 06 Nov 2014

Good Technology

Conquering Network Security Challenges in Distributed Enterprises
sponsored by Palo Alto Networks
WHITE PAPER: This whitepaper provides guidance for businesses evaluating the current state of their network security. Learn how to centralize network security governance and prioritize threats without affecting business flow.
Posted: 15 Oct 2015 | Published: 30 Jun 2015

Palo Alto Networks

Considering Layered Security? 14 Questions to Ask
sponsored by VSS Monitoring
WHITE PAPER: Today's networks and data centers are a critical asset to organizations of every size. This white paper serves as a guideline when considering layered network security solutions, ensuring that your enterprise stays ahead of ever-advancing security and network threats. Click here to see your security questions answered.
Posted: 05 Aug 2015 | Published: 05 Aug 2015

VSS Monitoring

How to Remove the Barriers to Cloud Collaboration Adoption
sponsored by Mimecast
WEBCAST: In this webinar, join Forrester Research-backed experts as they take you through the advantages of adopting cloud collaboration technology, overcoming security challenges, and developing a flexible strategy.
Posted: 27 Oct 2015 | Premiered: Oct 27, 2015


Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015


Bolster Your Enterprise Risk Management with Network-wide Protection
sponsored by Palo Alto Networks
CASE STUDY: In this case study, you will examine how Tennis Australia was able to implement next-generation firewall technology to seamlessly identify and prevent potential threats to their wide area network (WAN). Access this study now to learn how to deploy intrusion prevention.
Posted: 16 Oct 2015 | Published: 18 May 2013

Palo Alto Networks

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013


Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement