Hardware  >   Security Hardware  >   Network Security Hardware  >  

Appliances

RSS Feed    Add to Google    Add to My Yahoo!
DEFINITION: An appliance or "network appliance" is a term used to denote a relatively low-cost PC designed for Internet access and specialized business use, but without the capabilities of a fully-equipped PC.
AppliancesReports
 
DDoS Mitigation: Best Practices for a Rapidly Changing Threat Landscape
sponsored by Verisign, Inc.
WHITE PAPER: This guide explores one company's set of best practices that enables organizations to keep pace with DDoS attacks while minimizing impact on business operations.
Posted: 28 Feb 2014 | Published: 31 Dec 2012

Verisign, Inc.

A Foundation for Next-Generation Data Center Security
sponsored by Citrix
WHITE PAPER: This white paper introduces an application delivery controller (ADC) that builds enterprise cloud networks using existing data center infrastructure.
Posted: 13 Aug 2013 | Published: 28 Sep 2012

Citrix

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hewlett-Packard Company

Protecting the Enterprise Against Today's Distributed Denial of Service (DDoS) Attacks
sponsored by Corero Network Security
WHITE PAPER: With today’s increasing reliance on the Internet, it is of utmost importance to ensure security and uninterrupted availability in order to maintain a competitive advantage. View this resource now to explore the risks of DDoS attacks, the latest DDoS attack trends, guidelines for a DDoS defense program and more.
Posted: 26 Mar 2012 | Published: 26 Mar 2012

Corero Network Security

Web application firewalls: How they can help protect customers
sponsored by Astaro
EGUIDE: In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Astaro

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

Zero Day to Real-Time: How to combat real-time cybercrime with community threat intelligence
sponsored by McAfee, Inc.
WHITE PAPER: Cybercrime's new techniques demand a new weapon. Read this white paper to learn how this real-time network integrates threat disciplines and introduces new detection and response models that will provide effective protection as the malware wars escalate.
Posted: 23 Apr 2009 | Published: 02 Dec 2008

McAfee, Inc.

Simplifying branch office security
sponsored by Sophos, Inc.
WHITE PAPER: Enforcing consistent network security throughout your enterprise can be challenging—especially for those of you with branch offices with few users and no IT expertise. This paper introduces a new standard — an innovative, unified, cost-effective solution for managing branch office security.
Posted: 06 Apr 2012 | Published: 01 Dec 2011

Sophos, Inc.

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Protect Single Buildings and Campuses with Easy, Web-based Access Control
sponsored by RedCloud Security
DATA SHEET: Uncover how to protect individual buildings and campuses easily with the web-based access control network appliance, RedCloud Express. View this data sheet now to learn more and discover how this access control platform delivers powerful, plug-and-play protection in an affordable, all-in-one security management solution.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

RedCloud Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement