Hardware  >   Security Hardware  >   Network Security Hardware  >  

Security Appliances

RSS Feed   
Security Appliances Reports
 
SASE: A How to Guide
sponsored by Apcela
WEBCAST: In this webcast, join Mark Casey and Kunal Thakkar of Apcela as they show how enterprises are creating a Secure Access Service Edge (SASE) network security architecture built for the cloud.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Apcela

Pioneering DIY retailer future proofs SD-WAN security.
sponsored by Barracuda
CASE STUDY: Organizations looking to migrate firewall security, simplify network management, improve visibility, enhance connectivity and regulate traffic would gain much valuable information from this case study. It details a DIY retail chain that faced these challenges and how they were able to overcome them through upgrading their security architecture.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Barracuda

Can a SASE architecture deliver better network performance?
sponsored by SearchNetworking.com
EGUIDE: Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

SearchNetworking.com

MPLS, SD-WAN, Internet, and SASE
sponsored by Cato Networks
WHITE PAPER: The WAN is the backbone of the business. It ties together your remote locations, headquarters and data centers into an integrated network. Yet, the role of the WAN has evolved in recent years. In this white paper, learn about the connectivity, optimization and security options that are needed when building a network for the digital business.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Cato Networks

Secure SD-WAN: the launch pad into cloud.
sponsored by Barracuda
WHITE PAPER: Most organizations intend to leverage the many benefits of SD-WAN, including stronger security, better performance, improved user experience and cost optimization. However, like many emerging technologies, SD-WAN does not come without its challenges. In this research report, explore adoption trends of SD-WAN across the globe.
Posted: 23 Jun 2020 | Published: 30 Jun 2020

Barracuda

WFH: How to Ensure End Users Stay Connected
sponsored by AppNeta
RESOURCE: In this resource, explore the different stages of network transformation that enterprises across the Globe suddenly had to reckon with as COVID-19 forced businesses to adopt “work from home” across their workforce.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

AppNeta

Top 10 Network Security Best Practices
sponsored by Extreme Networks
WHITE PAPER: Network security issues are here to stay. As we become more connected, more mobile, and more cloud-driven, they are only going to increase. The huge security breaches that have hit so many leading companies are clear evidence that the ground rules are changing. In this white paper, explore a list of the top 10 network security best practices.
Posted: 10 Mar 2020 | Published: 10 Mar 2020

Extreme Networks

ITProTV | Microsoft AZ 500: Create, Configure, Network, App Security Groups
sponsored by Cornerstone OnDemand
WEBCAST: In this video, learn what Network Security Groups and Application Security Groups are, and explore the 7 steps required to filter network traffic with a network security group using the Azure Portal.
Posted: 25 Jun 2020 | Premiered: Jun 25, 2020

Cornerstone OnDemand

Breaking the Cyber Attack Lifecycle
sponsored by Palo Alto Networks
WHITE PAPER: This white paper discusses the modern landscape of cybersecurity, and how enterprises can detect and prevent attacks at every stage of the attack lifecycle, and remain agile in the face of advanced attacks.
Posted: 10 Dec 2015 | Published: 31 Mar 2015

Palo Alto Networks

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences