Hardware  >   Security Hardware  >   Network Security Hardware  >  

Network Security Appliances

RSS Feed   
ALSO CALLED: Security Appliances, Antivirus Appliances, Client Remote Access Appliances, Appliance, Appliances, Encryption Appliances, Web Intrusion Prevention Appliances
DEFINITION: An appliance that combines firewall security, VPN, and traffic management functions.
Network Security Appliances White Papers (View All Report Types)
1 - 25 of 62 Matches Previous Page  |  Next Page
Building Networks with Security at Their Core
sponsored by 128 Technology
WHITE PAPER: Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

128 Technology

Advancing ICS Visibility and Cybersecurity with the Nozomi Networks Solution
sponsored by Nozomi Networks
WHITE PAPER: The industrial sector is digitizing and automating processes at an increasingly rapid rate. While connected systems deliver new value and improved productivity, they also heighten cyber risk. Read this white paper to learn about Nozomi Networks security tool and how it can give you the reliability and visibility you need to keep OT networks safe.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Nozomi Networks

Financial Services: How to Achieve the Proper Network Visibility
sponsored by Gigamon
WHITE PAPER: In this white paper, learn about the Gigamon Visibility Platform and how it enables financial services firms to build an effective network security infrastructure, maximize tool efficiency without compromising network resiliency, and ensure compliance with strict industry mandates.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Network Packet Broker for the Next Generation
sponsored by Gigamon
WHITE PAPER: In this white paper, learn about network packet brokers designed for digital business. Find out how they help ensure that IT security and performance monitoring tools have comprehensive visibility into network traffic across the enterprise to operate at peak efficiency.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

6 Reasons Why Your Security Appliance Solution is Failing Your Business
sponsored by Avast Software
WHITE PAPER: A decade ago it was easier to secure most businesses. With less advanced threats, most SMBs were protected with a combination of Unified Threat Management and Secure Web Gateways. In this white paper, uncover the most common reasons these security application solutions are now failing your business.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Avast Software

Shortcomings of Traditional Security and Digital OT
sponsored by Fortinet, Inc.
WHITE PAPER: The rapid adoption of digital tools and services has caused internet-connected information technology (IT) networks to increasingly intersect with previously isolated operations technology (OT) networks. Find out what this means for your security posture in this white paper.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Fortinet, Inc.

OT Network Security Starts with Visibility
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) and information technology (IT) have traditionally been kept separate in most cases, but now they are being integrated—which is causing a lot of problems for security. In this white paper, find out how you can protect your IT-OT environment while getting the visibility, control, and situational awareness you need.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Fortinet, Inc.

A Security Approach for Protecting Converged IT and OT
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) networks have traditionally been kept separate from information technology (IT) networks. But as the integration of OT and IT is accelerates, OT networks are more exposed than ever to attacks coming from IT networks. Find out how you can thwart attacks and minimize OT risk with 5 best practices in this white paper.
Posted: 12 Aug 2019 | Published: 12 Aug 2019

Fortinet, Inc.

DIY or NSP? Finding the optimal approach to deploying a next-generation SD-WAN
sponsored by Windstream Communications
WHITE PAPER: In this white paper from Windstream Enterprise, discover the key considerations as organizations demand a rapid response to updating the WAN to support a modern digital business.
Posted: 22 Jul 2019 | Published: 22 Jul 2019

Windstream Communications

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN
sponsored by Akamai Technologies
WHITE PAPER: Read this white paper to learn why Internet is the corporate WAN of the near future, and how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers simplified security, lower latency and better performance, fewer broken web pages and applications.
Posted: 12 Jul 2019 | Published: 12 Jul 2019

Akamai Technologies

Micro-segmentation: Accelerate growth while enabling zero trust adoption
sponsored by Guardicore
WHITE PAPER: Microsegmentation has a strong reputation in hybrid-cloud environments due to its ability to secure critical assets and restrict communication across a heterogeneous IT ecosystem. Learn about best practices for establishing microsegmentation, and how to get started with it in this white paper.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Guardicore

VMware NSX vs. Guardicore Centra: Comparing segmentation platforms
sponsored by Guardicore
WHITE PAPER: Download this white paper for a comparison of 2 leading microsegmentation providers: Guardicore Centra Security Platform and VMware NSX. It explores their features, benefits and challenges.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Guardicore

Definitive Guide to Next-Generation Network Packet Brokers
sponsored by Gigamon
WHITE PAPER: Download the new Definitive Guide™ to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Gigamon

Network Architecture with Security in Mind
sponsored by Gigamon
WHITE PAPER: Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Gigamon

The Surprising Ways that Inline Bypass Helps Protect Network Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn about inline bypass and how it can help remove failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Find out how you can maximize threat prevention, security resilience and network uptime.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

Gigamon

Connected Business: Next-generation Networks for Retailers
sponsored by Barracuda
WHITE PAPER: The following paper explains the benefits of using SD-WAN to efficiently deploy applications to highly distributed offices and stores. To learn how you can take advantage of SD-WAN's flexible network capabilities, read on now.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

Barracuda

Security at the Speed of Your Network
sponsored by Gigamon
WHITE PAPER: Traditional security tools are often unable to keep up with the volume and speed of today's network data, resulting in performance degradation, unnecessary expenditures, and more. In this white paper, find out how you can combat these challenges by incorporating packet broker technology in your network security architecture.
Posted: 03 Jun 2019 | Published: 03 Jun 2019

Gigamon

Firewall Cleanup Recommendations
sponsored by FireMon
WHITE PAPER: In this white paper, learn about specialized tools and features that can help clean up enterprise-wide firewalls efficiently and thoroughly.
Posted: 21 May 2019 | Published: 21 May 2019

FireMon

Not All Next-Generation Firewalls Are Created Equal
sponsored by Barracuda Networks
WHITE PAPER: This paper digs into how to build your own secure application delivery network using a firewall that can appropriately optimize traffic between locations for latency and throughput. Read on to see this framework and to learn how your organization can benefit from it.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Guide to Understanding SD-WAN: Security Options in Different Networking Architectures
sponsored by Apcela
WHITE PAPER: As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Apcela

Key Principles and Strategies for Securing the Enterprise Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

AI-Driven Cyber Crime Puts Network Engineering in the Hot Seat
sponsored by Fortinet, Inc.
WHITE PAPER: Cyber criminals are leveraging AI and agile development techniques to outpace human security analysts and outmaneuver even the newest network defenses. In this white paper, learn different ways to revamp your network security strategy to help keep you protected from an evolving threat landscape.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Fortinet, Inc.

What to Look for in a Network Access Control Tool
sponsored by Fortinet, Inc.
WHITE PAPER: Download this to learn what you should look for when choosing a network access control (NAC) tool to help you stay protected in the face of changing network infrastructure and sophisticated endpoint attacks.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Fortinet, Inc.

Using AI to Address Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Read this white paper to learn how AI and machine learning can help you improve network security and keep up with the evolving nature of threats by automating and speeding up detection and remediation.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Fortinet, Inc.

Bridging the NOC-SOC Divide
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can strengthen security by bridging the gap between siloed network operations centers (NOCs) and security operations centers (SOCs) to provide the needed agility, scalability and better use of technical resources.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Fortinet, Inc.
1 - 25 of 62 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement