Hardware  >   Security Hardware  >   Network Security Hardware  >  

Web Intrusion Prevention Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Web Intrusion Prevention Appliances Reports
 
The Five Essential Capabilities of an Analytics-Driven SOC
sponsored by Splunk
WHITE PAPER: Organizations are now looking to analytics-driven security operations centers (SOCs) to close the gaps in their network defenses. In this white paper, uncover how a successful SOC should have 5 key attributes.
Posted: 04 Aug 2017 | Published: 04 Aug 2017

Splunk

Top 10 Reasons for Selecting an Array Networks SSL VPN
sponsored by Array Networks
RESOURCE: Discover 10 reasons customers are choosing an Array Networks SSL VPN to provide secure access to remote applications and remote data centers. Build your awareness of next-generation SSL VPNs that are simple yet flexible and scalable yet cost-effective, and designed to drive business productivity while minimizing network exposure.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Array Networks

The $38 Billion Security Vulnerability Your Enterprise Can't Afford to Ignore: Phone and Video Hacking
sponsored by Vyopta
WHITE PAPER: An architecture firm was surprised by a $166,000 phone bill they accrued in 1 weekend, and found that hackers had placed premium-rate phone calls through their network. Telecom fraud is a multi-billion dollar threat you can't afford. Learn about the impact of this threat, as well as immediate tactics to prevent telecommunications hacking.
Posted: 14 Jul 2017 | Published: 14 Jul 2017

Vyopta

Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

ComputerWeekly.com

Botnets: The dark side of cloud computing
sponsored by Astaro
WHITE PAPER: Botnets pose a serious threat to your network and business, rivaling the power today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. View this paper to explore how to protrect against the risk of botnets with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

Astaro

Antimalware IT Checklist: From Business Problem to Technical Solution Part 1
sponsored by SearchSecurity.com
EGUIDE: In the first of SearchSecurity.com's three-part guide on selecting antimalware products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of antimalware solutions.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016


Retail Data Breaches Expose Security Vulnerabilities – What Can We Learn?
sponsored by Symantec Corporation
WEBCAST: Tune in to this informative webcast to learn about how to protect your database from breaches and other security vulnerabilities.
Posted: 12 May 2014 | Premiered: Mar 4, 2014

Symantec Corporation

Information Security Magazine – July/August 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

Plan Your Firewall Migration to Increase Security Resilience
sponsored by Ixia
WHITE PAPER: This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.
Posted: 09 Feb 2017 | Published: 30 Dec 2016

Ixia
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement