Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Virus Protection Appliances

RSS Feed   
Virus Protection Appliances Reports
 
Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.

A Technical Introduction to Bro: Network Security's Best Kept Secret
sponsored by Corelight
WEBCAST: Watch this webinar to learn about open-source network security monitor Bro—now known as Zeek—and how it can help you get deep, actionable traffic insight you can use for network analysis.
Posted: 06 Feb 2019 | Premiered: Feb 6, 2019

Corelight

4 Server Security Must-Haves
sponsored by Dell and Intel®
WHITE PAPER: Analysts have pinpointed firmware attacks as one of today's greatest system threats. Uncover four security features that server architecture should have to ensure your data center's most critical pieces of hardware are cyber-resilient and gap-free.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

Dell and Intel®

Drive Security Intelligence With Splunk
sponsored by Splunk
CASE STUDY: In this case study, find out why missile systems manufacturer, MBDA Germany chose to deploy Splunk Enterprise and Splunk Enterprise Security when they were in need of a tool that would give them the visibility to identify and investigate threats targeting the organization more effectively.
Posted: 22 Mar 2019 | Published: 22 Mar 2019

Splunk

Cisco's Digital Marketing Transformation
sponsored by Domo Technologies
CASE STUDY: In this case study, learn how Cisco conceptualizes its marketing technology landscape and how a business intelligence platform enables Cisco's drive to create best-in-class experiences.
Posted: 02 Oct 2018 | Published: 02 Oct 2018

Domo Technologies

Optimize Refresh Cycles By Leveraging Real-World Data
sponsored by Dell EMC
RESOURCE: Hardware refreshes are a key responsibility of IT departments, but there are no carved-in-stone rules about when or where infrastructure needs to be updated. Learn how to read between the lines of workload data to strategically determine refresh timing and ideal technology choices.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Dell EMC

How To Strengthen Security While Optimizing Network Performance
sponsored by Gigamon
RESEARCH CONTENT: Download "How to Strengthen Security While Optimizing Network Performance" to see how next-generation network packet brokers (NGNPBs) mitigate security tool sprawl, simplify IT management and improve network availability.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

Gigamon

Anybody Home? Vulnerability Scans vs. Penetration Tests
sponsored by SkOUT
WHITE PAPER: This white paper defines, and digs into the differences between, vulnerability scans and penetration testing so you can apply them as needed and properly defend against known threats.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

SkOUT

Network Visibility and Using "Bro" with Vincent Stoffer
sponsored by Corelight
WEBCAST: Watch this video to hear Director of Customer Solutions at Corelight, Vincent Stoffer, discuss network visibility and threat hunting as well as pairing the company's hardware appliance with the open-source software, Bro, now known as Zeek—enabling security teams to use Bro at an enterprise scale for accurate network traffic analysis.
Posted: 01 Feb 2019 | Premiered: Feb 1, 2019

Corelight

Transform Network Traffic into High-fidelity Logs for Analysis
sponsored by Corelight
PRODUCT OVERVIEW: Watch this webinar to learn about an open source framework designed to transform network traffic into high-fidelity logs that summarize activity, and automate traffic analysis to help you focus on finding the attacker.
Posted: 05 Feb 2019 | Published: 05 Feb 2019

Corelight
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement