Hardware  >   Security Hardware  >   Network Security Hardware  >  

Network Security Appliances

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Security Appliances, Antivirus Appliances, Client Remote Access Appliances, Appliance, Appliances, Encryption Appliances, Web Intrusion Prevention Appliances
DEFINITION: An appliance that combines firewall security, VPN, and traffic management functions.
Network Security Appliances Reports
26 - 50 of 122 Matches Previous Page  |  Next Page
Secure Enterprise Applications on All Your Users' Mobile Devices
sponsored by VMware
WHITE PAPER: This white paper highlights a cloud service designed to help organizations leverage O365 on their mobile devices. Discover how to secure all company apps both cloud and on-premise and accelerate enterprise mobility.
Posted: 18 Sep 2015 | Published: 31 Jan 2014

VMware

Wan Virtualization: Scaling Bandwidth and Increasing Application Reliability
sponsored by Citrix
WHITE PAPER: This white paper provides an overview of a cloud-based, WAN virtualization solution that will improve the performance and reliability of business critical applications such as VDI, application virtualization, VoIP, video conferencing, ERP and CRM. Read on now to increase effective network capacity.
Posted: 17 Sep 2015 | Published: 17 Sep 2015

Citrix

Cloud-Based Communication Case Study: Upgrading TheLadders
sponsored by ThinkingPhones
WEBCAST: In this webcast case study, Nick Giordano, Technical Support Specialist at TheLadders, explains how his organization upgraded their infrastructure by transitioning from a legacy system to cloud-enabled business communications through a third-party service.
Posted: 01 Sep 2015 | Premiered: Aug 10, 2015

ThinkingPhones

Intralinks® Information Rights Management
sponsored by IntraLinks, Inc
DATA SHEET: Access this data sheet to learn about an Information Rights Management tool that can secure your content.
Posted: 30 Apr 2015 | Published: 31 Dec 2014

IntraLinks, Inc

Network Encryption and its Impact on Enterprise Security
sponsored by Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Blue Coat Systems

Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015

SearchSecurity.com

Secure Your Network: Best Practices for Battling Security Threats
sponsored by TechTarget
RESOURCE: Our new e-guide, How to Overcome Top Network Security Obstacles, shares best practices and information on the latest tools available, so that you can make an informed decision and achieve the best possible network security.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Getting the Most out of your NextGen Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise

Network Project of the Year 2014
sponsored by Talari_DON'T USE
CASE STUDY: This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Talari_DON'T USE

Who Achieves 100% on NSS Data Center Firewall Security Testing
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive resource analyzes a firewall solution that has passed all stability, reliability, and firewall policy enforcement tests to ensure that your environment is as safe as it can be.
Posted: 19 Jun 2014 | Published: 19 Jun 2014

Fortinet, Inc.

Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention
sponsored by Palo Alto Networks
WHITE PAPER: Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.
Posted: 16 Jun 2014 | Published: 10 Jul 2014

Palo Alto Networks

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hewlett Packard Enterprise

Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by Dell, Inc.
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

Dell, Inc.

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

DDoS Prevention: Time for "Defense in Depth"
sponsored by Fortinet, Inc.
ANALYST REPORT: This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Fortinet, Inc.

Protect Your Data Center from Today's Evolving DDoS Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Fortinet, Inc.

Right-Size Your Network Without Compromise
sponsored by Cisco
WHITE PAPER: This white paper introduces a WAN solution that allows organizations to transition from premium WAN bandwidth to more affordable internet transport, without sacrificing compliance or user experience.
Posted: 07 Apr 2014 | Published: 07 Apr 2014

Cisco

Buyer's Criteria for Next-Generation Network Security
sponsored by Sourcefire
WHITE PAPER: This whitepaper outlines current factors driving organizations to look at next-generation networking solutions and offers analysis on the capabilities of these new technologies.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos, Inc.

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye
26 - 50 of 122 Matches Previous Page    1 2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement