Hardware  >   Security Hardware  >   Network Security Hardware  >  

Network Security Appliances

RSS Feed   
ALSO CALLED: Security Appliances, Antivirus Appliances, Client Remote Access Appliances, Appliance, Appliances, Encryption Appliances, Web Intrusion Prevention Appliances
DEFINITION: An appliance that combines firewall security, VPN, and traffic management functions.
Network Security Appliances Reports
1 - 25 of 118 Matches Previous Page  |  Next Page
How 1 School Manages and Secures its Multi-Vendor Wi-Fi Infrastructure
sponsored by TechData - HPE
CASE STUDY: After announcing a virtual learning initiative for its over 650,000 K-12 students, Los Angeles Unified School District (LAUSD), needed a tool that could help to help unify, manage and secure its multi-vendor Wi-Fi infrastructure. Find out why LAUSD chose Aruba Networks to help them, and learn about the benefits they experienced in this case study.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

TechData - HPE

How 1 Company Addressed Zero-Day Attacks on 60+ Customer Networks
sponsored by Farsight Security
CASE STUDY: LuJam Cyber provides cybersecurity for small and medium organizations, and needed to bring in enterprise threat intelligence to help stop zero-day attacks across their 60+ customer networks. Download this case study to learn how implementing Farsight Security's Newly Observed Domains (NOD) tool helped them prevent more attacks than ever.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

Farsight Security

Global Internationalized Domain Name Homograph Report
sponsored by Farsight Security
RESEARCH CONTENT: Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

Farsight Security

Strengthen Network Security with DNS
sponsored by Farsight Security
WEBCAST: In this webinar, ThreatSTOP Chief Scientist Dr. Paul Mockapetris, the inventor of DNS, and Farsight Security CEO Dr. Paul Vixie, who designed, implemented and deployed several DNS protocol extensions and applications that are used throughout the Internet today, will discuss how you can use DNS to strengthen your network security.
Posted: 15 Mar 2019 | Premiered: Mar 15, 2019

Farsight Security

Guide to Understanding SD-WAN: Security Options in Different Networking Architectures
sponsored by Apcela
WHITE PAPER: As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Apcela

Key Principles and Strategies for Securing the Enterprise Cloud
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how to create a multi-cloud network security strategy based on 3 key principles, and examine use cases to see how other organizations keep themselves secure.
Posted: 01 Mar 2019 | Published: 01 Mar 2019

Fortinet, Inc.

AI-Driven Cyber Crime Puts Network Engineering in the Hot Seat
sponsored by Fortinet, Inc.
WHITE PAPER: Cyber criminals are leveraging AI and agile development techniques to outpace human security analysts and outmaneuver even the newest network defenses. In this white paper, learn different ways to revamp your network security strategy to help keep you protected from an evolving threat landscape.
Posted: 28 Feb 2019 | Published: 28 Feb 2019

Fortinet, Inc.

What to Look for in a Network Access Control Tool
sponsored by Fortinet, Inc.
WHITE PAPER: Download this to learn what you should look for when choosing a network access control (NAC) tool to help you stay protected in the face of changing network infrastructure and sophisticated endpoint attacks.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Fortinet, Inc.

Using AI to Address Advanced Threats
sponsored by Fortinet, Inc.
WHITE PAPER: Read this white paper to learn how AI and machine learning can help you improve network security and keep up with the evolving nature of threats by automating and speeding up detection and remediation.
Posted: 27 Feb 2019 | Published: 27 Feb 2019

Fortinet, Inc.

Bridging the NOC-SOC Divide
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn how you can strengthen security by bridging the gap between siloed network operations centers (NOCs) and security operations centers (SOCs) to provide the needed agility, scalability and better use of technical resources.
Posted: 26 Feb 2019 | Published: 26 Feb 2019

Fortinet, Inc.

NPMD for Network Security Forensics
sponsored by Viavi
WHITE PAPER: Download this white paper to learn about network performance monitoring and diagnostics (NPMD) and network forensics and how they can help strengthen protection against ever-increasing cyberattacks, malware, and internal espionage threats.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Viavi

Understanding 802.1X and NAC: 3 Problems to Avoid
sponsored by Fortinet, Inc.
WHITE PAPER: Read guide to review the limitations of the 802.1X standard and/or commercial network access control (NAC) tools when it comes to protecting your network from BYOD and IoT attacks. Also, learn the 3 major problems to avoid when choosing a NAC tool: lack of visibility, lack of control, and lack of automation.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Fortinet, Inc.

A Network Operations Guide for Intent-Based Segmentation
sponsored by Fortinet, Inc.
WHITE PAPER: Download this white paper to learn more about Intent-based Segmentation and how it can help you effectively improve security posture, mitigate risks, and support compliance and operational efficiency—without altering your network architecture.
Posted: 25 Feb 2019 | Published: 25 Feb 2019

Fortinet, Inc.

The Evolution of Network Access Control
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper, learn why security architects should reevaluate network access controls to protect endpoints, users, and the broader organization from the potentially disastrous effects of a device-borne breach.
Posted: 22 Feb 2019 | Published: 22 Feb 2019

Fortinet, Inc.

Scaling Network Security
sponsored by Gigamon
ANALYST REPORT: Network speeds continue to increase, putting a strain on security controls that can't scale at the same rate as the networks. Read this research paper to review different network architectures that were designed with security in mind. Also learn about current requirements for today's networks, as well as guidelines for the future.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Gigamon

How You Can Make Incident Response Faster and More Efficient
sponsored by Corelight
WEBCAST: Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

Corelight

The Importance of a Common Distributed Data Services Layer
sponsored by Gigamon
RESEARCH CONTENT: Read this research report to learn about distributed data services layers, and the critical role they play in enabling a secure distributed network environment, regardless of whether they are physical or virtual.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Gigamon

A Technical Introduction to Bro: Network Security's Best Kept Secret
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight

Universities, Network Security, and Bro: A Roundtable Discussion
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight

Transform Network Traffic into High-fidelity Logs for Analysis
sponsored by Corelight
PRODUCT OVERVIEW: Watch this webinar to learn about an open source framework designed to transform network traffic into high-fidelity logs that summarize activity, and automate traffic analysis to help you focus on finding the attacker.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Corelight

An Introduction to Threat Hunting with Bro Zeek
sponsored by Corelight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

Corelight

"Bro" Open-Source Framework with Alan Saldich
sponsored by Corelight
WEBCAST: In this webcast, listen to Chief Marketing Officer at Corelight, Alan Saldich, talk about the open source software Bro, now known as Zeek. Learn how CoreLight's sensors help enable the large-scale usage of Bro by retrieving and organizing the data you need to track network traffic and performance.
Posted: 05 Feb 2019 | Premiered: Feb 5, 2019

Corelight

A Revolution in Network Security Monitoring Is Underway: Are You Ready?
sponsored by Corelight
WEBCAST: Watch this video to hear from networking industry analyst Zeus Kerravala to learn how cutting-edge organizations are leading a security monitoring revolution, away from scattershot network visibility toward a unified, comprehensive visibility approach with tools purpose-built for security teams.
Posted: 04 Feb 2019 | Premiered: Feb 4, 2019

Corelight

Network Visibility and Using "Bro" with Vincent Stoffer
sponsored by Corelight
WEBCAST: Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

Corelight

How 1 Hospital Transformed Network Security
sponsored by Micro Focus
CASE STUDY: When network performance fell at a major North American hospital, it was a sign that years of IT security neglect had led to serious problems. The hospital had developed a reputation as a soft target and experienced daily network attacks. Read this case study to learn how this hospital began addressing threats before they become a problem.
Posted: 31 Jan 2019 | Published: 31 Jan 2019

Micro Focus
1 - 25 of 118 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement