Hardware  >   Security Hardware  >   Network Security Hardware  >  

Appliances

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An appliance or "network appliance" is a term used to denote a relatively low-cost PC designed for Internet access and specialized business use, but without the capabilities of a fully-equipped PC.
Appliances Reports
 
The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Automation in Network Security Management: Friend or Foe?
sponsored by Palo Alto Networks
WEBCAST: This webcast discusses the risks and benefits of automation as it pertains to security the psychological aspects of being against automation, and how you can automate your network processes for threat analysis and also from a management perspective.
Posted: 11 Apr 2016 | Premiered: Apr 11, 2016

Palo Alto Networks

Creating a Network Endpoint Security Policy for Hostile Endpoints
sponsored by SearchSecurity.com
EGUIDE: Discover how the Zero Trust Model can help you secure the multiple endpoints accessing your network and prevent the spreading and loss of sensitive data. In addition, uncover the five data security design patterns that will help you implement this strategy successfully.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

SearchSecurity.com

Cybersecurity Buyer's Guide
sponsored by Palo Alto Networks
RESOURCE: This white paper provides guidance on choosing the right cybersecurity solution for your organization. If you are looking for a new tool, discover 10 things your solution must do, and a checklist that you can use to make your decision.
Posted: 06 Apr 2016 | Published: 31 Dec 2015

Palo Alto Networks

Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER: Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014

Palo Alto Networks

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Extreme Networks Physical Security Solution
sponsored by Extreme Networks
WHITE PAPER: This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Information Security Magazine – July/August 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement