Hardware  >   Security Hardware  >   Network Security Hardware  >  

Network Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Appliances, Antivirus Appliances, Client Remote Access Appliances, Appliance, Appliances, Encryption Appliances, Web Intrusion Prevention Appliances
DEFINITION: An appliance that combines firewall security, VPN, and traffic management functions.
Network Security Appliances Reports
1 - 25 of 121 Matches Previous Page  |  Next Page
Validating DDoS Threat Protection
sponsored by A10 Networks
WHITE PAPER: Access this white paper, which contains strategies for protecting the network against the devastating effects of distributed denial of service (DDoS) attacks.
Posted: 10 Feb 2016 | Published: 10 Feb 2016

A10 Networks

Speak SMB Security: How You Can Be a Security Thought Leader
sponsored by OpenDNS
WEBCAST: In this webcast, learn best practices for defending against the new crime ecosystem and what SMBs need to do to stay protected. Download now to discover why cybercrime is easier than ever and 3 steps for securing your customers.
Posted: 09 Feb 2016 | Premiered: Dec 18, 2015

OpenDNS

Choosing a Firewall That's Right for You
sponsored by Palo Alto Networks
VIDEO: This webcast discusses how to retain the advantages of enterprise apps while minimizing risk with better network security. Learn how to choose a firewall that's right for your business's apps and users.
Posted: 09 Feb 2016 | Premiered: 29 Feb 2012

Palo Alto Networks

SANS- A Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, you will discover the keys to lowering IR costs and maximizing ROI, View now and learn how to increase your organization's security level by developing an IR process utilizing manual and basic forensics.
Posted: 29 Jan 2016 | Published: 31 Dec 2015

Blue Coat Systems

Advanced Threat Detection with Machine-Generated Intelligence
sponsored by Prelert
RESEARCH CONTENT: In this resource, you will discover the research results from a survey of 614 IT security practitioners in the U.S., revealing a lack of confidence in their IT security team's ability to defend their organization. Read on to learn why adoption of a machine-generated intelligence will bolster your cyberdefense.
Posted: 29 Jan 2016 | Published: 31 Oct 2015

Prelert

What Story Does Your IT Security Tell?
sponsored by Prelert
DATA SHEET: In this resource, you will discover how to analyze log data and locate anomalies in order to combat advanced cyberthreats with an anomaly detection application. Access this resource to apply behavioral analytics to any data resource—including Windows event logs, DNS logs, and firewall logs.
Posted: 28 Jan 2016 | Published: 31 Dec 2015

Prelert

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Securing the Enterprise with an ADC
sponsored by A10 Networks
WHITE PAPER: To protect web applications, organizations need to deploy the right firewalls. Access this infographic to learn more ways to strengthen security in the enterprise when you secure your data center assets, protect sensitive data with SSL offloading, and more.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

A10 Networks

Is Your Network Security Limited to Defending Yesterday's Threats?
sponsored by IBM
WHITE PAPER: In this infographic, you will discover how to safeguard your organization from new and emerging threats with a next-gen IPS. Read on how to move beyond pattern matching and apply behavior-based protection to combat advanced and unknown threats to defend your organization.
Posted: 25 Jan 2016 | Published: 03 Nov 2015

IBM

Infographic: Top Reasons You Need A High Performance ADC
sponsored by A10 Networks
WHITE PAPER: In a world where 35% of data breaches consist of web attacks, you need a reliable security strategy. Access this infographic to learn what's at stake for network security, and how you can mitigate these issues with four key capabilities.
Posted: 25 Jan 2016 | Published: 20 Nov 2014

A10 Networks

A Practical Guide to Combating Advanced Malware
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: This white paper features research based on thousands of pieces of malware they detected over the course of one year. Access this guide for details on four capabilities designed to help protect your organization against next-generation network threats.
Posted: 18 Jan 2016 | Published: 30 Sep 2014

WatchGuard Technologies, Inc.

The 10 Essential Network Security Best Practices for 2016
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: In this infographic, you will discover the top 10 essential, expert-recommended security best practices for identifying issues in real time and addressing the majority of attacks anticipated in 2016. Access this graphic to bolster your network defenses and prepare for ransomware that targets Android devices and Mac laptops, and more.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

WatchGuard Technologies, Inc.

8 Reasons why Users are Rethinking their SIEM Strategy
sponsored by LogRhythm, Inc.
WHITE PAPER: This brief yet informative infographic highlights eight reasons why having the right SIEM approach is critical to productivity, compliance and ROI. Read on to determine if your current SIEM practices are doing the most for your network security.
Posted: 11 Jan 2016 | Published: 11 Jan 2016

LogRhythm, Inc.

Tenable's Continuous Network Monitoring and the Verizon DBIR
sponsored by Tenable Network Security
WHITE PAPER: This paper discusses how you can use Verizon's Data Breach Investigation Report and apply its findings easily to your own organization.
Posted: 29 Dec 2015 | Published: 29 Jun 2015

Tenable Network Security

Bridge the Gap with SDN
sponsored by Avaya
VIDEO: This brief video provides helpful hints for turning the network you have into the network you need. By tuning in, you'll discover why software-defined networking provides the agility -- and security -- required to keep pace with your business.
Posted: 23 Dec 2015 | Premiered: 08 Oct 2015

Avaya

2016 Global Cybersecurity Assurance Report Card
sponsored by Tenable Network Security
RESEARCH CONTENT: This research study measures how enterprise IT security professionals view their ability to assess and mitigate cyber security risks.
Posted: 21 Dec 2015 | Published: 21 Dec 2015

Tenable Network Security

Proactive Incident Response: Prepare Now or Pay Later
sponsored by Blue Coat Systems
WHITE PAPER: This infographic features a proactive approach to incident response. Discover how to gain visibility and reduce response time by recording and analyzing all network traffic, earning you up to 55% in savings by reducing costs associated with data breaches.
Posted: 09 Dec 2015 | Published: 09 Dec 2015

Blue Coat Systems

Protect your Network with Effective Incident Response
sponsored by Blue Coat Systems
VIDEO: For a holistic view of security, organizations need effective incident response. Watch this videocast to find a demo on comprehensive network forensics.
Posted: 08 Dec 2015 | Premiered: 08 Dec 2015

Blue Coat Systems

How to Apply the Data and Network Maturity Model to Four Technology Pillars
sponsored by Carousel Industries
WHITE PAPER: This expert white paper shows how you can evaluate your approach to network and security against a proven maturity model, which will help you determine if you're adopting new technologies in the most efficient way. Read on to learn how you can apply this model to a variety of technologies
Posted: 08 Dec 2015 | Published: 08 Dec 2015

Carousel Industries

Analytics Stop Advanced Threats in their Tracks
sponsored by Blue Coat Systems
WHITE PAPER: In this solution brief, you'll find relief knowing that breaches can be treated with a comprehensive approach that provides the intelligence and real-time analysis needed to see, understand, respond to and fortify the network against advanced threats.
Posted: 04 Dec 2015 | Published: 31 Dec 2014

Blue Coat Systems

How to Assure Application Performance and QoS at Scale
sponsored by VMTurbo
WHITE PAPER: In this white paper, you will learn the benefits gained from incorporating network traffic and topology information in VM placement decisions—including increased application performance and enhanced QoS.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

VMTurbo

Executive Summary: Proactive Response to Incident Response
sponsored by Blue Coat Systems
WHITE PAPER: This white paper describes how to find a solution that addresses two main drivers of incident response (IR) costs. Discover key strategies for lowering costs and maximizing ROI when performing IR, with details on three maturity models.
Posted: 03 Dec 2015 | Published: 30 Sep 2015

Blue Coat Systems

SAHMRI Selects CommScope Network Infrastructure Solutions to Support World-Class Medical Research
sponsored by CommScope
CASE STUDY: This case study examines how the South Australian Health Medical Research Institute was able to enable efficient changes and improved network security through the deployment of CommScope's GigaSPEED X10D®, LazrSPEED®, and TeraSPEED® systems.
Posted: 02 Dec 2015 | Published: 02 Dec 2015

CommScope

When Policy and Productivity go Hand-in-Hand
sponsored by IBM
WHITE PAPER: Access this article and learn how to accommodate the new ways employees collaborate, while also maintaining a level of control and visibility over what corporate data can and cannot be shared with third-party cloud apps.
Posted: 01 Dec 2015 | Published: 22 Sep 2015

IBM

Advanced Threat Protection Strategies for your Network
sponsored by Symantec Corporation
DATA SHEET: This data sheet offers strategies for uncovering veiled threats that infiltrate organizations by leveraging your network protocols. Access now to find out how you can expose these attacks and optimize network security.
Posted: 30 Nov 2015 | Published: 30 Nov 2015

Symantec Corporation
1 - 25 of 121 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement