Hardware  >   Security Hardware  >  

Security Devices

RSS Feed    Add to Google    Add to My Yahoo!
Security Devices Reports
Grow your Business with a Scalable Network
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this guide, you'll learn about ideal networking strategies. Access now and discover how to leverage networking for business growth, and what to look for in networking technology.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

Hewlett Packard Enterprise

Network Security Considerations for Private vs. Public Clouds
sponsored by Palo Alto Networks
WHITE PAPER: The purpose of this white paper is to present security-related information which companies should consider when deciding whether to pursue public or private cloud deployment. Compare cloud models against several criteria, including physical and virtual attack surfaces, data migration, incident management, and more.
Posted: 20 Oct 2015 | Published: 31 May 2015

Palo Alto Networks

Deploying a Next-Gen Platform for Managed Security Service Providers (MSSP)
sponsored by Palo Alto Networks
CASE STUDY: This case study explains how to reduce your security operating expenses by 50% by upgrading your network security services into the cloud. Learn how to onboard customers seamlessly and deliver faster service for your customers.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Palo Alto Networks

The Importance of Security in Cloud-Managed Wi-Fi Infrastructure
sponsored by Fortinet, Inc.
ANALYST REPORT: In this analyst report, you will compare the capabilities of controller-based Wi-Fi against those of cloud-managed, and address the security concerns that cloud-enabled wireless presents. Get the answers to your must-ask security questions about cloud-managed Wi-Fi.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

Fortinet, Inc.

Deliver a Secure and Fluid Web Experience with Next-Gen Firewall Technology
sponsored by Palo Alto Networks
CASE STUDY: In this case study, you will learn how CESA leveraged a next-generation firewall and security platform in conjunction with in-house developed integration components, allowing for a truly fluid, secure web experience. Access now to discover how you can target dangerous apps, sites, and content without missing a beat.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Palo Alto Networks

Improve Organizational Security with End-to-End Mobile Protection
sponsored by MXN Corporation
WHITE PAPER: In this brief white paper, you will learn about a mobile operating system with built in end-to-end security that will transform your enterprise mobility. Learn how to prevent unauthorized access to your networks without the need for Network Access Control (NAC) software.
Posted: 16 Nov 2015 | Published: 31 Jul 2013

MXN Corporation

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012


Simple-to-Use Endpoint Security: Proactive Solutions for Networkwide Platforms
sponsored by ESET
WHITE PAPER: This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology.
Posted: 03 Sep 2009 | Published: 06 Feb 2009


Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement