Hardware  >   Security Hardware  >   Network Security Hardware  >  

Antivirus Appliances

RSS Feed   
Antivirus Appliances Reports
 
The Surprising Ways that Inline Bypass Helps Protect Network Operations
sponsored by Gigamon
WHITE PAPER: In this white paper, learn about inline bypass and how it can help remove failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Find out how you can maximize threat prevention, security resilience and network uptime.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

Gigamon

OT Network Security Starts with Visibility
sponsored by Fortinet, Inc.
WHITE PAPER: Operational technology (OT) and information technology (IT) have traditionally been kept separate in most cases, but now they are being integrated—which is causing a lot of problems for security. In this white paper, find out how you can protect your IT-OT environment while getting the visibility, control, and situational awareness you need.
Posted: 13 Aug 2019 | Published: 13 Aug 2019

Fortinet, Inc.

Application Optimization for SD-WAN
sponsored by Barracuda
VIDEO: Watch this video for a walkthrough of how to reduce latency and improve cloud app performance in SD-WAN environments using a cloud-based firewall.
Posted: 11 Jun 2019 | Premiered: 31 Aug 2018

Barracuda

Universities, Network Security, and Bro: A Roundtable Discussion
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight

An Introduction to the Security Advantages of Mirco-Segmentation
sponsored by VMware
WHITE PAPER: Traditional data center works to defer threats from breaching your network's perimeter, so what do you do once it gets inside? Read this white paper to learn why we can't permanently resolve the perimeter-style network security problem and what micro-segmentation offers as a supplement to your existing network security.
Posted: 29 Mar 2017 | Published: 30 Nov 2016

VMware

Cybersecurity Starts with a Secure Network
sponsored by StarHub
WHITE PAPER: Enterprises desire robustness and agility in a network, so they can move at the pace of their customers. They realize that losing a connection means losing a sale. However, one area that should not be overlooked is cybersecurity. In this expert article, explore 4 cybersecurity features businesses should look for when evaluating an SD-WAN provider.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

StarHub

The Importance of a Common Distributed Data Services Layer
sponsored by Gigamon
RESEARCH CONTENT: Read this research report to learn about distributed data services layers, and the critical role they play in enabling a secure distributed network environment, regardless of whether they are physical or virtual.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Gigamon

Drive Security Intelligence With Splunk
sponsored by Splunk
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement