Hardware  >   Security Hardware  >  

Network Hardware

RSS Feed   
Network Hardware Reports
 
Understanding 802.1X and NAC: 3 Problems to Avoid
sponsored by Fortinet, Inc.
WHITE PAPER: Read guide to review the limitations of the 802.1X standard and/or commercial network access control (NAC) tools when it comes to protecting your network from BYOD and IoT attacks. Also, learn the 3 major problems to avoid when choosing a NAC tool: lack of visibility, lack of control, and lack of automation.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Fortinet, Inc.

Drive Security Intelligence With Splunk
sponsored by Splunk
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk

Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

ComputerWeekly.com

Leveraging a Smart Lighting System to Enter a Building Network
sponsored by Forescout
RESOURCE: Although smart lighting systems increase energy efficiency, improve working conditions and optimize space utilization in a building, their connection to the internet provides a potential network entry point for malicious actors. Download this infographic to learn more.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Forescout

Advancing ICS Visibility and Cybersecurity with the Nozomi Networks Solution
sponsored by Nozomi Networks
WHITE PAPER: The industrial sector is digitizing and automating processes at an increasingly rapid rate. While connected systems deliver new value and improved productivity, they also heighten cyber risk. Read this white paper to learn about Nozomi Networks security tool and how it can give you the reliability and visibility you need to keep OT networks safe.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Nozomi Networks

Barracuda Advanced Threat Protection for SD-WAN
sponsored by Barracuda
PRODUCT DEMO: Tune into this quick, 4-minute video to learn how to protect your users, data, and apps from advanced threats and malware—both at the headquarters and at branch office locations.
Posted: 31 May 2019 | Premiered: 31 May 2019

Barracuda

Strategies for Distributed Network Security
sponsored by Forcepoint
RESEARCH CONTENT: Download this report to explore research on how financial institutions are adjusting to the challenges of digital transformation. The findings are based on a survey of senior IT executives in the financial industry on their distributed network security strategy.
Posted: 13 May 2019 | Published: 13 May 2019

Forcepoint

Shortcomings of Traditional Security and Digital OT
sponsored by Fortinet, Inc.
WHITE PAPER: The rapid adoption of digital tools and services has caused internet-connected information technology (IT) networks to increasingly intersect with previously isolated operations technology (OT) networks. Find out what this means for your security posture in this white paper.
Posted: 15 Aug 2019 | Published: 15 Aug 2019

Fortinet, Inc.

Security Considerations When Undergoing a Network Refresh
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper discusses crucial considerations you need to keep in mind when undergoing a network refresh, outlining the impact that emerging technologies will have on network and security management, along with what you can do to ensure that your network is high-performance and secure.
Posted: 02 Jun 2014 | Published: 02 Jun 2014

Hewlett Packard Enterprise

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement