Hardware  >   Security Hardware  >   Network Security Hardware  >  

Appliances

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An appliance or "network appliance" is a term used to denote a relatively low-cost PC designed for Internet access and specialized business use, but without the capabilities of a fully-equipped PC.
AppliancesReports
 
Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

Poison Ivy and Random Access Tools: What You Need to Know
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Unchain Your Network with Application Intelligence and Control
sponsored by Dell Software
WHITE PAPER: Learn about the new risks that organizations face due to the prevalence of Web-based applications, and how to take secure control of applications, data and bandwidth.
Posted: 23 Aug 2013 | Published: 31 Jul 2012

Dell Software

Miercom Report: How to Enable Firewall Security without Hurting Performance
sponsored by Sophos, Inc.
WHITE PAPER: This Miercom report focuses on tests that measure firewall performance in the most common day-to-day scenarios. Read on to learn how 5 different appliances match up regarding firewall throughput, application control throughput, and more.
Posted: 08 Aug 2014 | Published: 08 Aug 2014

Sophos, Inc.

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Web application firewalls: How they can help protect customers
sponsored by Astaro
EGUIDE: In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Astaro

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall
sponsored by Riverbed Technology, Inc.
WHITE PAPER: PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.

Antimalware IT Checklist: From Business Problem to Technical Solution Part 1
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Controlling Botnets with the Next-Generation Firewall
sponsored by Palo Alto Networks
WHITE PAPER: View this paper for an overview of botnets and how they work; and uncover a model that can enable enterprises to proactively protect themselves with the unique capabilities of next-generation firewalls.
Posted: 14 Mar 2012 | Published: 14 Mar 2012

Palo Alto Networks

E-Book: Technical Guide on Network Security Monitoring
sponsored by SearchMidMarketSecurity
EBOOK: SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.
Posted: 17 May 2010 | Published: 17 May 2010

SearchMidMarketSecurity
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement