Hardware  >   Security Hardware  >   Network Security Hardware  >  

Client Remote Access Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Client Remote Access Appliances Reports
 
A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Download this exclusive white paper now to learn about the current state of DoS landscape, common approaches for dealing with DoS attacks, and much more.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Citrix

Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015

SearchSecurity.com

Network Forensics in a 10G World
sponsored by WildPackets, Inc.
WHITE PAPER: This resource outlines the challenges inherent to 10G network forensics, explains why traditional network analysis is ineffective, and offers guidance on how to build and deploy effective forensics in a 10G world.
Posted: 30 Aug 2013 | Published: 30 Aug 2013

WildPackets, Inc.

iSensor specifications
sponsored by Dell, Inc.
DATA SHEET: Organizations need advanced security technology, strong security expertise and 24x7 vigilance to safeguard their networks and IT systems. This data sheet offers an overview and specifications of Dell SecureWorks’ proprietary network intrusion prevention appliance, iSensor. Learn about its key features and how it can protect your networks.
Posted: 18 May 2011 | Published: 18 May 2011

Dell, Inc.

Examining SSL-encrypted Communications
sponsored by Netronome Systems
WHITE PAPER: SSL-encrypted communications have enabled a variety of secure, web-based communications and online transactions. This paper explores the drivers behind the increase in SSL usage and the methods used to confront the security challenges that SSL creates.
Posted: 26 Oct 2007 | Published: 16 Oct 2007

Netronome Systems

Gartner Magic Quadrant for Unified Threat Management
sponsored by Sophos, Inc.
ANALYST REPORT: Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.
Posted: 09 May 2013 | Published: 05 Mar 2012

Sophos, Inc.

Protecting the Enterprise Against Today's Distributed Denial of Service (DDoS) Attacks
sponsored by Corero Network Security
WHITE PAPER: With today’s increasing reliance on the Internet, it is of utmost importance to ensure security and uninterrupted availability in order to maintain a competitive advantage. View this resource now to explore the risks of DDoS attacks, the latest DDoS attack trends, guidelines for a DDoS defense program and more.
Posted: 26 Mar 2012 | Published: 26 Mar 2012

Corero Network Security

Frost & Sullivan: Continuous Compliance and Next Generation NAC
sponsored by ForeScout Technologies, Inc.
WHITE PAPER: Let's face it, cybercrime is growing and attacks are becoming far more prevalent. This guide explores the role of NAC in securing your network and how it is important to keep your network up-to-date as BYOD and mobility continue to rise.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

ForeScout Technologies, Inc.

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

Botnets: The dark side of cloud computing
sponsored by Astaro
WHITE PAPER: Botnets pose a serious threat to your network and business, rivaling the power today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. View this paper to explore how to protrect against the risk of botnets with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

Astaro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement