IT Management  >   Systems Operations  >   Network Management  >   Network Performance  >  

Network Behavior Anomaly Detection

RSS Feed    Add to Google    Add to My Yahoo!
Network Behavior Anomaly Detection Reports
 
A Consolidated Platform for Next-Generation Firewall and Secure Web Gateway Services
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Posted: 16 Oct 2014 | Published: 30 Sep 2014

Fortinet, Inc.

Improving Application Availability with a Comprehensive Approach to WAN Optimization
sponsored by BlueCoat
EGUIDE: Satisfying a WAN's need for speed may not be the best and most cost-effective way to improve applications performance and access across a network. Read about a more constructive approach in this eGuide.
Posted: 18 Sep 2009 | Published: 18 Sep 2009

BlueCoat

Ixia Black Book: 802.11ac Wi-Fi Benchmarking
sponsored by Ixia
WHITE PAPER: Examine 802.11ac Wi-Fi test methodologies in this white paper, which provides insight into the capabilities and features that matter most.
Posted: 07 Mar 2014 | Published: 07 Mar 2014

Ixia

Unified Visibility Fabric Architecture – A New Approach to Visibility
sponsored by Gigamon
WHITE PAPER: In this informative white paper, uncover a unified visibility fabric architecture that centralizes network monitoring and management tools for improved and simplified performance and security analysis.
Posted: 24 Sep 2013 | Published: 30 Aug 2013

Gigamon

4 Questions to Ask When Evaluating Network Security Solutions
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This brief yet informative resource reveals the four questions you must ask when evaluating potential multilayer network security products to ensure you get the most out of your new investment.
Posted: 21 Aug 2013 | Published: 21 Aug 2013

WatchGuard Technologies, Inc.

AlertBoot Transitions to the Cloud at One-Third the cost with Riverbed Stingray Traffic Manager
sponsored by Riverbed Technology, Inc.
CASE STUDY: This case study reveals how a leading provider of full disk encryption switched to the cloud and needed a balancing soltution that could support the migration and prevent downtime.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Riverbed Technology, Inc.

Increase Visibility Into Virtual Infrastructures With a Layered Security Strategy
sponsored by CA Technologies.
EGUIDE: Brought to you by SearchNetworking.com, this expert E-Guide unveils how you can increase your visibility with a layered security strategy.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

CA Technologies.

SDN use beyond the data centre
sponsored by Hewlett-Packard Limited
ANALYST REPORT: This analyst report covers 5 different examples of companies that have experienced many positive results after adopting software-defined networks (SDN), beyond the enterprise data centre.
Posted: 26 Sep 2013 | Published: 10 Jul 2013

Hewlett-Packard Limited

Mobile Cloud Security: What CXOs Need to Know
sponsored by Cisco Systems, Inc.
RESOURCE: This blog post discusses the need for end-to-end security in a mobile cloud environment.
Posted: 27 Nov 2014 | Published: 28 Nov 2014

Cisco Systems, Inc.

WAN Deduplication: Getting More by Sending Less
sponsored by Silver Peak
WHITE PAPER: This paper discusses how WAN deduplication works, and how it can be effectively deployed as a complement to existing storage deduplication solutions.
Posted: 17 May 2012 | Published: 31 Dec 2008

Silver Peak
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement