Hardware  >   Security Hardware  >  

Security Devices

RSS Feed    Add to Google    Add to My Yahoo!
Security DevicesReports
 
Achieve Network Visibility and Control with Firewall Traffic Classification
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, explore a firewall traffic classification solution that offers improved visibility and control over every application that traverses the network. Learn more about the 4 unique technologies that help identify any potential risks so IT can enforce stronger application enablement policies.
Posted: 24 Jan 2014 | Published: 21 Mar 2014

Palo Alto Networks

SuperMassive Series data sheet
sponsored by Dell Software
PRODUCT OVERVIEW: The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

The Definitive Guide to Next Generation Firewalls: Which One is Right for You?
sponsored by Fortinet, Inc.
WEBCAST: This exclusive webcast takes an in-depth look at NGFWs, discussing five crucial "must-haves" for firewall success. Tune in now to find out more.
Posted: 23 Jun 2014 | Premiered: Jun 23, 2014

Fortinet, Inc.

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Intervention areas for superfast broadband project Connecting Cumbria
sponsored by ComputerWeekly.com
DATA SHEET: UK broadband roll-out: Download this Excel spreadsheet detailing the intervention status of postcodes across Cumbria
Posted: 15 Oct 2013 | Published: 15 Oct 2013

ComputerWeekly.com

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos, Inc.

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett-Packard Company
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 15 Apr 2014 | Published: 15 Apr 2014

Hewlett-Packard Company

Firewalls and IPS: Deploying Web Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative resource takes an in-depth look at internet edge firewall and intrusion prevention system (IPS) security services that protect your organization's gateway to the internet, providing helpful tips and guidance for ensuring your web presence is safe and secure.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Cisco Systems, Inc.

Five Simple Strategies for Securing APIs
sponsored by CA Technologies.
WHITE PAPER: This exclusive paper examines security risks unique to APIs and discusses five simple solutions to these issues.
Posted: 11 Jun 2014 | Published: 11 Jun 2014

CA Technologies.

InterMapper Network Monitoring Keeps Detroit Radio Stations on the Air
sponsored by InterMapper
CASE STUDY: When Greater Media Detroit’s three radio stations encountered several hard to find and difficult to understand network problems, they turned to InterMapper to track the issues down. Read their story here.
Posted: 07 Apr 2011 | Published: 05 Apr 2011

InterMapper
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement