Hardware  >   Security Hardware  >  

Network Security Devices

RSS Feed    Add to Google    Add to My Yahoo!
Network Security Devices Reports
SearchSecurity.com University: Network Security
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This classroom provides tactics for validating the performance and effectiveness of key network security technologies and strategies for ensuring they work together to provide pervasive protection.
Posted: 07 Aug 2013 | Premiered: 07 Aug 2013


Case Study: Large ISP Transforms DNS, Protects Network
sponsored by Nominum, Inc.
CASE STUDY: The following case study examines how Nominum helped a large North American ISP transform their DNS infrastructure, which in turn allowed the ISP to foil the DDoS attack and safeguard them from further DNS exposure. Access now and learn how you can do the same in your business.
Posted: 14 May 2015 | Published: 14 May 2015

Nominum, Inc.

The Real Costs of a DNS Outage
sponsored by Nominum, Inc.
CASE STUDY: This paper details the costs that were incurred by a global broadband provider after a DoS attack compromised their DNS. Access now and learn about the harsh realities of an ill-prepared infrastructure that couldn't cope with services outages. Read on to learn how you can prepare your own business to avoid a similar fate.
Posted: 14 May 2015 | Published: 14 May 2015

Nominum, Inc.

DDoS Prevention: Time for "Defense in Depth"
sponsored by Fortinet, Inc.
ANALYST REPORT: This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Fortinet, Inc.

Protect Your Data Center from Today's Evolving DDoS Threats
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Fortinet, Inc.

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012


Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012


The Self-Defending Network
sponsored by Cisco Systems, Inc.
WHITE PAPER: Your network is one of your most important business assets, and you need to protect this valuable resource from hackers, viruses, spyware, and other threats. Your business needs security that's built into every part of your network to proactively spot suspicious activity, identify threats, and adapt to new challenges quickly.
Posted: 14 Jun 2005 | Published: 13 Aug 2009

Cisco Systems, Inc.

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013


PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall
sponsored by Riverbed Technology, Inc.
WHITE PAPER: PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement