Hardware  >   Security Hardware  >  

Security Devices

RSS Feed   
Security Devices White Papers (View All Report Types)
 
A Network for Blazing Fast and Secure Content Experiences
sponsored by Cloudflare
WHITE PAPER: As user expectations for speed, stream quality, and image quality grow, performance becomes more crucial for growing media and entertainment companies. At the same time, companies must keep their data secure. Download this white paper to learn how you can improve your security posture while boosting performance.
Posted: 04 May 2020 | Published: 04 May 2020

Cloudflare

Securosis: Network Operations and Security Professionals' Guide to Managing Public Cloud Journeys
sponsored by Gigamon
WHITE PAPER: Your cloud journey is unique, but a new guide shows there are common patterns that steer you to the best approach for a successful outcome. Learn which cloud adoption pattern your organization aligns with, key risks, recommendations and important questions to ask yourself at each stage of your journey.
Posted: 16 Sep 2020 | Published: 01 Mar 2020

Gigamon

Network Security Management for IT and Industrial Networks
sponsored by Beta Systems
WHITE PAPER: Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Beta Systems

Network Architecture with Security in Mind
sponsored by Gigamon
WHITE PAPER: Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Gigamon

Five Key Steps To Securely Connect Your Remote Workforce
sponsored by Intrado
WHITE PAPER: After the initial scramble to enable employees to stay safe by working from home, companies are now able to take stock of the situation and address any security gaps. In this white paper, uncover 5 key steps to help you create a long-term sustainable plan for secure remote working.
Posted: 18 Mar 2021 | Published: 18 Mar 2021

Intrado

Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

Gunner Peterson's Security Gateway Buyer’s Guide
sponsored by Intel
WHITE PAPER: Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences