Hardware  >   Security Hardware  >  

Network Security Hardware

RSS Feed    Add to Google    Add to My Yahoo!
Network Security HardwareReports
1 - 25 of 61 Matches Previous Page  | Next Page
Is Your Data Center Ready for Today’s DDoS Threats?
sponsored by Fortinet, Inc.
WHITE PAPER: This guide explores various DDoS attack types and highlights some key protection methods for testing your detection and mitigation defenses.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

Fortinet, Inc.

SC Magazine Security Brief: Server Side Risk
sponsored by Lumension
WHITE PAPER: This crucial resource analyzes how attackers today use advance persistent threats (APTs) to exploit server vulnerabilities to disrupt business and steal critical information, discussing also how to prepare for and mitigate these attacks.
Posted: 18 Apr 2014 | Published: 18 Apr 2014

Lumension

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Hewlett-Packard Company

Evaluating Cost Of A DDoS Attack
sponsored by Dyn
WHITE PAPER: This brief whitepaper evaluates the costs of DDoS attacks and explores what current organizations are doing to prevent them.
Posted: 09 Apr 2014 | Published: 09 Apr 2014

Dyn

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper offers unique insight and analysis into how network security professionals can better identify, manage, and contain the leading network security risk factors that arise from a mobile, always-on workforce.
Posted: 07 Apr 2014 | Published: 31 Jan 2014

Hewlett-Packard Limited

Protecting Control Networks: Key Considerations For Protection
sponsored by Sourcefire
WHITE PAPER: This whitepaper takes a look at how to secure control networks, with strategies before, during and after an attack.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

Sourcefire

DDOS Mitigation a Key Component in Network Security
sponsored by Ixia
WHITE PAPER: This expert e-guide explores why DDoS prevention needs to be a main part of your network security plan.
Posted: 27 Mar 2014 | Published: 27 Mar 2014

Ixia

UltraDNS: Performance and Security for Your Online Business
sponsored by Neustar®
WHITE PAPER: This informative paper examines DNS solution that provides you with the performance and uptime that you need while protecting against security threats that could impact availability.
Posted: 19 Mar 2014 | Published: 19 Mar 2014

Neustar®

Reassessing DDoS - Lessons Learned
sponsored by Neustar®
PODCAST: This exclusive podcast discusses why your organization needs to reassess your DDoS protection strategy, discussing the latest waves of attacks and what they could evolve into.
Posted: 19 Mar 2014 | Premiered: Mar 19, 2014

Neustar®

Extending Next Generation Firewalls – Security Leaders must Address Threats from Rising SSL Traffic
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

Purchase Intentions – Summer 2013 Europe
sponsored by TechTarget
RESOURCE: Making the right purchasing decisions is a daunting task, especially when it concerns the well-being of your organizations network. By taking this brief survey you will gain access to this exclusive guide based off a survey completed by over 600 respondents on purchase intentions. Learn what drives purchases, what is being purchased, and much more!
Posted: 18 Mar 2014 | Published: 18 Mar 2014

TechTarget

Implementing a Security Analytics Architecture
sponsored by EMC Corporation
WHITE PAPER: This guide explores the inabilities in traditional security management and how advanced threats are growing even more sophisticated.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

EMC Corporation

Next-Gen Security
sponsored by Dell Software
WHITE PAPER: Find out how SSL decryption and inspection can keep attackers away from your data and out of your network. Given that SSL threats are likely to increase, it's more important than ever for businesses to consider purchasing next-generation firewalls.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

Dell Software

SANS WhatWorks in Detecting and Blocking Advanced Threats: A Real Case Study at a Large Research Organization
sponsored by FireEye
WHITE PAPER: Cybercriminals are always looking for new ways to infiltrate your system, making it essential to have an effective intrusion prevention system (IPS). This white paper explores one company's IPS platform and how it can greatly enhance your system security.
Posted: 06 Mar 2014 | Published: 06 Mar 2014

FireEye

Protecting DNS Infrastructure - Inside and Out
sponsored by Infoblox
WHITE PAPER: This guide takes a look at some top threats your network faces and explores the strategies needed to defend yourself against DNS-based attacks.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

Infoblox

Poison Ivy: Assessing Damage and Extracting Intelligence
sponsored by FireEye
WHITE PAPER: This guide explores the current threat landscape and more specifically Poison Ivy, a remote access tool that has been used in several high-profile malware campaigns. Read on to learn which tools you need to defend yourself from this form of cybercrime.
Posted: 05 Mar 2014 | Published: 31 Dec 2013

FireEye

Building a Better Network Security Strategy
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative resource discusses what features a network security strategy should cover in order to ensure success in today's business world.
Posted: 03 Mar 2014 | Published: 03 Mar 2014

Hewlett-Packard Company

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Get Back to Basics for Improved Network Security
sponsored by Lumeta Corporation
EGUIDE: This expert guide from SearchSecurity.com examines why it is that so few organizations know about SNMP, discussing how to forget the bells and whistles of network security and revisit the best practices that can ensure the safest environment.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Lumeta Corporation

Chiayi City Tax Bureau Protects Intranet and Extranet from Unauthorized Access with Extreme Networks
sponsored by Extreme Networks
WHITE PAPER: This cast study takes a look at how one company successfully updated their network infrastructure and boosted network performance.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Extreme Networks

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012

Imperva

Extreme Networks Physical Security Solution
sponsored by Extreme Networks
WHITE PAPER: This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

5 Steps to Network Situational Awareness
sponsored by Lumeta Corporation
WHITE PAPER: This exclusive paper examines a five step program to achieve Network Situational Awareness and gain a thorough understanding of your network infrastructure so you can more closely manage any changes and catch problems before they impact your business.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

Lumeta Corporation

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos, Inc.
1 - 25 of 61 Matches Previous Page    1 2 3    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement