IT Management  >   Systems Operations  >   Network Management  >  

Network Traffic

RSS Feed   
Network Traffic Reports
 
Rethink Firewalls: The Compelling Economic Case for Software-Based Segmentation
sponsored by Guardicore
WHITE PAPER: Why are IT and security teams still relying on legacy firewalls to do internal network segmentation? As policy-protected applications and segments proliferate, physical firewall appliances are proving ineffective in today’s increasingly dynamic hybrid-cloud environments. Read this white paper to learn about software-based segmentation.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Guardicore

How to Make SASE Real for Your Organization
sponsored by Forcepoint
EBOOK: SASE may be in its pioneering stages, but it’s shaped to revolutionize the way corporate networks are securely accessed. With network and security moving through the cloud through SASE, traffic is kept away from your network, keeping it safe from intruders. Dive into this e-book for a glimpse at SASE technology and what it could provide.
Posted: 14 Jul 2020 | Published: 12 Jun 2020

Forcepoint

Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
sponsored by Inky Technology
RESOURCE: Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

Demo: Cato Networks SD-WAN
sponsored by Cato Networks
VIDEO: In this 6-minute video, watch a demonstration of Cato Network's SD-WAN. Find out how SD-WAN can provide built-in network security for your Internet access with SLA-backed WAN and reliable cloud connectivity for mobile users.
Posted: 28 Mar 2018 | Premiered: 30 Mar 2017

Cato Networks

The Legal Cybersecurity Checklist
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Since 2011, 80 of the top 100 law firms have suffered a data breach. This is due to law firms’ being required to store and share vast amounts of private data. Adding to the fray is a number of regulations law firms must comply with at the risk of harsh penalties. Don’t delay, use this checklist to build stronger security for your firm’s data.
Posted: 04 Sep 2020 | Published: 04 Sep 2020

Arctic Wolf Networks, Inc.

Securing Branch Offices and Retail Stores in the Digital Age
sponsored by Palo Alto Networks
WHITE PAPER: The advancement of the branch office is matched only by the evolution of network threats. With networking solutions such as SD-WAN now on the market, organizations must rethink their branch office security. Read this white paper outline the challenges of branch security and view typical use cases.
Posted: 31 Aug 2020 | Published: 31 Aug 2020

Palo Alto Networks

Apex One Datasheet
sponsored by Trend Micro
DATA SHEET: The scales have almost fully tipped toward remote work. This means that endpoints need to be more secure than ever before. Malware and ransomware are rampant, and without state-of-the-art vulnerability defense and even features such as encryption, you could be at a major risk. Take a look at this data sheet to discover modern endpoint security.
Posted: 02 Sep 2020 | Published: 02 Sep 2020

Trend Micro

How SSL and TLS Secure Network Transactions
sponsored by Symantec & Blue Coat Systems
EGUIDE: This expert e-guide explores how SSL and TLS can be used to defend any type of network traffic.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

Symantec & Blue Coat Systems

Using Policy Based Routing and Access Control Lists in a Virtualized Network
sponsored by DellEMC and Intel®
WHITE PAPER: Explore this informative white paper to discover what's involved in configuring and applying PBR, user scenarios and much more.
Posted: 04 Mar 2014 | Published: 31 Dec 2013

DellEMC and Intel®

Optimizing Visibility, Control and Performance of Network Traffic
sponsored by Ixia
WHITE PAPER: Learn how network monitoring switches can help offload and control your current tools, providing the visibility you need for effective data center network monitoring and management.
Posted: 03 Mar 2014 | Published: 30 Jun 2013

Ixia
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info