Hardware  >   Security Hardware  >   Network Security Hardware  >  

Web Intrusion Prevention Appliances

RSS Feed   
Web Intrusion Prevention Appliances White Papers (View All Report Types)
 
MPLS, SD-WAN, Internet, and SASE
sponsored by Cato Networks
WHITE PAPER: The WAN is the backbone of the business. It ties together your remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. In this white paper, learn about the connectivity, optimization and security options that are needed when building a network for the digital business.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Cato Networks

How Retailers Use LTE as Wireless WAN to Improve Service & Operations
sponsored by CradlePoint
WHITE PAPER: Innovation is changing retail from the storefront to the back office and beyond. Because of this, IT teams and the enterprise networks they manage have never been more important. In this white paper, uncover emerging trends in retail IT, challenges posed by those trends, and considerations for choosing futureproof edge network solutions for retail.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

CradlePoint

IT Buyers’ Guide for In-Vehicle Network Solutions
sponsored by CradlePoint
WHITE PAPER: In this buyers’ guide, learn about the multitude of connectivity options available for in-vehicle networking solutions and gain a better understanding of these options to help you make an informed buying decision.
Posted: 18 May 2020 | Published: 18 May 2020

CradlePoint

Network Considerations for Restaurants Adopting a Cloud POS
sponsored by Comcast Business
WHITE PAPER: In this white paper, uncover the most important networking considerations that restaurant executives need to keep in mind when adopting a cloud POS system in order to ensure maximum benefit for those new systems.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

Comcast Business

Deploying Firewalls throughout Your Organization
sponsored by Cisco Systems, Inc.
WHITE PAPER: Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.
Posted: 08 Jul 2008 | Published: 01 Nov 2006

Cisco Systems, Inc.

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems
sponsored by DellEMC and Intel®
WHITE PAPER: Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.
Posted: 12 May 2014 | Published: 12 May 2014

DellEMC and Intel®

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

Botnets: The dark side of cloud computing
sponsored by Sophos
WHITE PAPER: Botnets pose a serious threat to your network and they rival the power of today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. This paper details how to protect against the risk of botnet infection with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos

Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER: Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Nevis Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info