Software  >   Systems Software  >   Server Software  >  

Security Proxies

RSS Feed    Add to Google    Add to My Yahoo!
Security ProxiesReports
 
Still Using Proxies for URL Filtering? There's a Better Way
sponsored by Palo Alto Networks
WHITE PAPER: This informative resource discusses a next-generation security solution that combines firewall and threat prevention technologies to provide the network visibility and control that proxy-based devices just can't offer.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Palo Alto Networks

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Toward an Identity & Context Virtualization Service: A Buyer’s Guide to Virtual Directories
sponsored by Radiant Logic, Inc.
WHITE PAPER: This paper is a practical guide to choosing the best virtual directory solution to meet your needs, both now and in the future. Check out this white paper for a blueprint on how to evaluate virtual directories, from use cases and technical parameters to the five questions you should ask yourself before choosing a virtualization solution.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

Radiant Logic, Inc.

Web Security Gateway: Web 2.0 Secured and Simplified
sponsored by Websense, Inc.
WHITE PAPER: The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

A Technical Review of Caching Technologies
sponsored by BlueCoat
WHITE PAPER: The goal of this white paper is to discuss the role of caching, describe in detail how object caching and byte caching works, and show how these caching technologies work together to deliver true performance differentiation.
Posted: 29 Jun 2009 | Published: 17 Dec 2007

BlueCoat

How to Gain Visibility and Control of Encrypted SSL Web Sessions
sponsored by BlueCoat
WHITE PAPER: Blue Coat's SSL proxy functionality enables organizations to extend the power of the intelligent and secure proxy appliances to all SSL traffic. Read about how a proxy gives visibility and control of SSL communications.
Posted: 20 Sep 2007 | Published: 01 Jan 2006

BlueCoat

Networks That Know Automation
sponsored by Juniper Networks, Inc.
WHITE PAPER: Access this white paper to learn how networks are using automation to their advantage, especially with the popularity of software-defined networking (SDN).
Posted: 23 Oct 2014 | Published: 01 Aug 2014

Juniper Networks, Inc.

How can SMBs meet the Virtualization Challenge?
sponsored by EMC
WHITE PAPER: Access this infographic to find out how SMBs can ensure that their virtual storage investments support their business goals and budgets.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

EMC

EMC’s Comprehensive Flash Strategy
sponsored by EMC Corporation
WHITE PAPER: Access this white paper to find out about flash storage solution that offer multi-flash models to deliver even better storage.
Posted: 30 Oct 2014 | Published: 31 Jul 2014

EMC Corporation

IBM System x Family Brochure
sponsored by Lenovo and Intel
WHITE PAPER: If you’re looking for ways to create a dynamic infrastructure, look no further. This brochure shows how IBM System x and BladeCenter servers help to deliver an infrastructure that reduces operating costs, manages present and future risk, and improves services.
Posted: 17 Oct 2014 | Published: 01 Sep 2014

Lenovo and Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement