Hardware  >   Security Hardware  >   Network Security Hardware  >  

Web Intrusion Prevention Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Web Intrusion Prevention Appliances Reports
 
WAN Speak Musings – Volume I
sponsored by ComputerWeekly.com
ANALYST REPORT: Analysts Clive Longbottom and Bob Tarzey discuss all things network related in this series of 12 short business focused articles.
Posted: 02 May 2013 | Published: 02 May 2013

ComputerWeekly.com

Securing the Perimeter Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Security School lesson examines how current and future IT trends have affected enterprises' network perimeter strategy and the technology and policy to support it.
Posted: 04 Feb 2015 | Premiered: 09 Feb 2015

SearchSecurity.com

Antimalware IT Checklist: Decision Time Part 3
sponsored by SearchSecurity.com
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 11 Apr 2012 | Published: 11 Apr 2012

SearchSecurity.com

Unified Threat Management Guide
sponsored by Sophos, Inc.
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 02 Jul 2014 | Published: 31 Dec 2013

Sophos, Inc.

7 Key Reasons to Implement an Identity Aware Network
sponsored by Applied Identity
WHITE PAPER: This paper provides you with insight into the seven key reasons why internal networks are migrating towards an identity and role based infrastructure to provide a more effective and cost efficient method for securing critical business assets.
Posted: 26 Mar 2008 | Published: 01 Mar 2008

Applied Identity

On-Demand Security Audit and Vulnerability Management - A Proactive Approach to Network Security
sponsored by Qualys, Inc.
WHITE PAPER: This paper explores the various approaches to network security and focuses on the unique role of vulnerability management and automated security audits. Learn about the four pillars of security and different approaches to vulnerability management.
Posted: 07 Nov 2006 | Published: 01 Sep 2006

Qualys, Inc.

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Kazeon Data Privacy & Security Solution
sponsored by Kazeon
WHITE PAPER: This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines.
Posted: 22 Nov 2006 | Published: 01 Nov 2006

Kazeon

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

Manage Physical Access Control within a Virtual Server Environment
sponsored by RedCloud Security
WHITE PAPER: Explore how to manage physical access control within a virtual server environment. View this data sheet to uncover RedCloud Virtual, a web-based, access control virtual appliance that allows organizations to maintain enterprise-grade physical security without the risk of storing sensitive information on a shared server hosted in a public cloud.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

RedCloud Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement