Hardware  >   Security Hardware  >   Network Security Hardware  >  

Web Intrusion Prevention Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Web Intrusion Prevention Appliances Reports
 
Laptop Management for Windows
sponsored by IBM
WHITE PAPER: Discover how to protect your enterprise laptops, desktops, ultrabooks, and tablets from a single screen. Read on to learn key benefits a solution can provide such as pushing software to devices independent of their location, lock devices remotely, demonstrate compliance for audits, and more.
Posted: 16 Jun 2016 | Published: 16 Jun 2016

IBM

How to Raise your Organization's Security Maturity Level
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper takes a look at the stages involved in the security maturity journey and defines five stages you can expect to encounter. Access now and learn ways to move from being security-blind to reaching a true level of resilience.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

LogRhythm, Inc.

How to Assure Application Performance and QoS at Scale
sponsored by VMTurbo
WHITE PAPER: In this white paper, you will learn the benefits gained from incorporating network traffic and topology information in VM placement decisions—including increased application performance and enhanced QoS.
Posted: 03 Dec 2015 | Published: 03 Dec 2015

VMTurbo

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

Information Security Magazine – July/August 2013
sponsored by SearchSecurity.com
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

SearchSecurity.com

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the key features of internal segmentation firewalls. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information with this next-gen security technology.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

Perceptions about Network Security: Ponemon research
sponsored by Juniper Networks, Inc.
ANALYST REPORT: Ponemon Institute conducted a survey of over a thousand IT and IT security practitioners across Europe, studying their perspectives about the current threat landscape and what they believe the most effective strategies for keeping networks safe include. Uncover key findings and leverage this knowledge to build the right strategy for your business.
Posted: 07 Jun 2012 | Published: 01 Feb 2012

Juniper Networks, Inc.

Computer Weekly – 19 March 2013: Delivering software development success
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.
Posted: 18 Mar 2013 | Published: 19 Mar 2013

ComputerWeekly.com

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

DDoS Prevention: Time for "Defense in Depth"
sponsored by Fortinet, Inc.
ANALYST REPORT: This informative guide provides you with key strategies to prevent DDoS attacks and outlines what you can expect in the coming years.
Posted: 24 Apr 2014 | Published: 24 Apr 2014

Fortinet, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement