Hardware  >   Security Hardware  >   Network Security Hardware  >  

Network Security Appliances

RSS Feed   
ALSO CALLED: Security Appliances, Antivirus Appliances, Client Remote Access Appliances, Appliance, Appliances, Encryption Appliances, Web Intrusion Prevention Appliances
DEFINITION: An appliance that combines firewall security, VPN, and traffic management functions.
Network Security Appliances Reports
26 - 50 of 134 Matches Previous Page  |  Next Page
Barracuda SD-WAN Zero Touch Deployment
sponsored by Barracuda
VIDEO: Tune into this video for a brief walkthrough of how to use Barracuda CloudGen Firewall to deploy SD-WAN.
Posted: 31 May 2019 | Premiered: 31 May 2019

Barracuda

Barracuda CloudGen Firewall Savings Calculator
sponsored by Barracuda
RESOURCE: How could your business benefit from a cloud-based firewall that includes protection against advanced persistent threats with full SD-WAN, link balancing, and WAN Optimization discipline? Find out by using the following cost and savings calculator for Barracuda's CloudGen Firewall.
Posted: 24 May 2019 | Published: 24 May 2019

Barracuda

Comprehensive Security for the Network Perimeter and Beyond
sponsored by Barracuda
PRODUCT OVERVIEW: Read this resource for the advantages of using a cloud-based firewall to optimize the performance and management of distributed networks, to scale across any number of locations and apps, and to protect your network perimeter with granular app controls.
Posted: 22 May 2019 | Published: 31 Dec 2018

Barracuda

Barracuda CloudGen Firewalls: Features and Capabilities
sponsored by Barracuda
PRODUCT OVERVIEW: This paper illustrates the features and capabilities of Barracuda's cloud-based firewalls, which aim to reduce IT spending as well as secure your data. Read on for further details on the cost-savings and capabilities of this solution and see how your enterprise may benefit from it.
Posted: 22 May 2019 | Published: 31 Dec 2018

Barracuda

Firewall Cleanup Recommendations
sponsored by FireMon
WHITE PAPER: In this white paper, learn about specialized tools and features that can help clean up enterprise-wide firewalls efficiently and thoroughly.
Posted: 21 May 2019 | Published: 21 May 2019

FireMon

Advanced Secure Access for Remote and Mobile Workers
sponsored by Barracuda Networks
PRODUCT OVERVIEW: Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Not All Next-Generation Firewalls Are Created Equal
sponsored by Barracuda Networks
WHITE PAPER: This paper digs into how to build your own secure application delivery network using a firewall that can appropriately optimize traffic between locations for latency and throughput. Read on to see this framework and to learn how your organization can benefit from it.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Barracuda Cloud Generation Firewall for IoT Deployments
sponsored by Barracuda Networks
PRODUCT OVERVIEW: To learn how to connect IoT devices and micro-networks to your corporate data center—whether it is centralized or distributed—read the following resource. It highlights a firewall designed to help you secure IoT traffic easily and economically.
Posted: 17 May 2019 | Published: 17 May 2019

Barracuda Networks

Eissmann Group Automotive Places Trust in Barracuda's CloudGen Firewall
sponsored by Barracuda Networks
CASE STUDY: Of the utmost importance to the Eissmann Group was obtaining a reliable intrusion prevention system, improving performance, and managing their distributed environment with ease. Read this case study to discover how they ultimately achieved their objectives with a cloud-based firewall.
Posted: 17 May 2019 | Published: 17 May 2019

Barracuda Networks

Build a Foundation for Business Growth and Digital Transformation with Secure SD-WAN
sponsored by Open Systems
RESEARCH CONTENT: This white paper explores why enterprises are transforming their networks today, and how SD-WAN with integrated security can help you reach your networking goals.
Posted: 16 May 2019 | Published: 16 May 2019


RHI Secures Global Locations with Barracuda
sponsored by Barracuda Networks
CASE STUDY: As they hit 90 locations, RHI's Frame Relay and MAN became incapable of ensuring reliable connections and efficient network security for the dispersed enterprise. So how did they manage to centralize their firewall management and increase bandwidth? Read the following case study to find out.
Posted: 16 May 2019 | Published: 16 May 2019

Barracuda Networks

Barracuda CloudGen Firewalls Protect Geocell's Expanding Operations
sponsored by Barracuda Networks
CASE STUDY: As telecom provider Geocell expanded, they found themselves spending too much time administering firewalls to each location—an incredibly tedious task. Learn more about the next-generation firewall that seamlessly centralized their network management controls in this case study.
Posted: 16 May 2019 | Published: 16 May 2019

Barracuda Networks

FineLine Technologies Secures Its Multi-location Network with Barracuda
sponsored by Barracuda Networks
CASE STUDY: FineLine Technologies struggled to find a robust firewall system that could be easily deployed across their global offices. This case study covers FineLine's journey and demonstrates how they found a firewall that could secure data across their globally dispersed network.
Posted: 15 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Strategies for Distributed Network Security
sponsored by Forcepoint
RESEARCH CONTENT: Download this report to explore research on how financial institutions are adjusting to the challenges of digital transformation. The findings are based on a survey of senior IT executives in the financial industry on their distributed network security strategy.
Posted: 13 May 2019 | Published: 13 May 2019

Forcepoint

How 1 Company Unified Security Management for Wired and Wireless Networks
sponsored by Aruba Networks
CASE STUDY: Daman is a leading specialist health insurer in Abu Dhabi, and was looking for a Network Access Control (NAC) solution to help them comply with a new electronic governmental standard for information security. Learn why Daman chose Aruba and the benefits they've experienced in this case study.
Posted: 30 Apr 2019 | Published: 30 Apr 2019

Aruba Networks

Secure Branch-to-Public-Cloud Connectivity with SD-WAN
sponsored by Barracuda
PRODUCT OVERVIEW: This paper highlights an SD-WAN architecture that manages security, networking, and app prioritization transparently across your entire organization—including all public cloud deployments. To learn how to achieve always-on app availability regardless of branch or office location, view the paper here.
Posted: 22 Apr 2019 | Published: 31 Dec 2018

Barracuda

MPLS Replacement with Broadband and Secure SD-WAN
sponsored by Barracuda
PRODUCT OVERVIEW: This paper presents an alternative: using SD-WAN protected by cloud-based firewalls to reduce costs and increase availability. Read on to learn how this approach simplifies deployment for all of the firewalls across your sites and gives you the added benefit of built-in redundancy and a more robust network.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Barracuda

Drive Security Intelligence With Splunk
sponsored by Splunk
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk

Global Internationalized Domain Name Homograph Report
sponsored by Farsight Security
RESEARCH CONTENT: Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

Farsight Security

Guide to Understanding SD-WAN: Security Options in Different Networking Architectures
sponsored by Apcela
WHITE PAPER: As enterprises shift more of their workloads to the cloud, they must also evaluate their networking architecture. A big part of this evaluation process is how and where to enforce security on data and applications. Download this white paper to learn about different security options available for SD-WAN and which one is right for you.
Posted: 07 Mar 2019 | Published: 07 Mar 2019

Apcela

How You Can Make Incident Response Faster and More Efficient
sponsored by Corelight
WEBCAST: Watch this webcast to learn about Zeek—an open-source network security monitor that is formally known as Bro—and see how it can transform network traffic into high-fidelity data streams for faster incident detection.
Posted: 08 Feb 2019 | Premiered: Feb 8, 2019

Corelight

A Technical Introduction to Bro: Network Security's Best Kept Secret
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight

Universities, Network Security, and Bro: A Roundtable Discussion
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor, Bro—now known as Zeek—and how companies and universities use it to transform raw network traffic into high-fidelity data streams for analysis and threat detection.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight

Transform Network Traffic into High-fidelity Logs for Analysis
sponsored by Corelight
PRODUCT OVERVIEW: Watch this webinar to learn about an open source framework designed to transform network traffic into high-fidelity logs that summarize activity, and automate traffic analysis to help you focus on finding the attacker.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Corelight

An Introduction to Threat Hunting with Bro Zeek
sponsored by Corelight
PRODUCT DEMO: Watch this webcast to hear from Richard Chitamitre, Jonathon Hall, and Andrew Pease—3 elite threat hunters with years of military service fighting on the cyberwarfare frontlines—on how to start using Zeek to hunt down attackers.
Posted: 05 Feb 2019 | Premiered: 05 Feb 2019

Corelight
26 - 50 of 134 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement