Hardware  >   Security Hardware  >  

Security Devices

RSS Feed   
Security Devices White Papers (View All Report Types)
 
4 Strategies for Safeguarding Security and User Experience
sponsored by Ixia - Keysight
WHITE PAPER: Edge computing is emerging as a viable way to reduce latency and improve performance. But that brings about a scary question: Is edge computing threatening user experience and making your network less secure? Find out in this white paper, and explore 4 tips for maintaining security and a good user experience.
Posted: 07 Oct 2019 | Published: 07 Oct 2019

Ixia - Keysight

The Evolution of Network Access Control
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn why security architects should reevaluate network access controls to protect endpoints, users, and the broader organization from the potentially disastrous effects of a device-borne breach.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

Fortinet, Inc.

Bridging the NOC-SOC Divide
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can strengthen security by bridging the gap between siloed network operations centers (NOCs) and security operations centers (SOCs) to provide the needed agility, scalability and better use of technical resources.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Fortinet, Inc.

Micro-segmentation: Accelerate growth while enabling zero trust adoption
sponsored by Guardicore
WHITE PAPER: Microsegmentation has a strong reputation in hybrid-cloud environments due to its ability to secure critical assets and restrict communication across a heterogeneous IT ecosystem. Learn about best practices for establishing microsegmentation, and how to get started with it in this white paper.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Guardicore

Insights and Recommendations for Top Security Concerns; Annual Security Report
sponsored by Cisco Systems, Inc.
WHITE PAPER: This informative report takes an in-depth look at the state of network security today, examining how your peers are utilizing the latest solutions and what your organization can do to ensure that your business critical data is kept safe.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hewlett Packard Enterprise

Unified Threat Management Guide
sponsored by Sophos
WHITE PAPER: This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Sophos

Best practices for implementing 2048-bit SSL
sponsored by Citrix
WHITE PAPER: Ready for 2048-bit SSL? Not with the competition. Shift to Citrix NetScaler for 2x faster 2048-bit SSL performance. Download the 2048-bit Performance Kit.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

Citrix

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

DellEMC and Intel®
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement