Hardware  >   Security Hardware  >   Network Security Hardware  >  

Web Content Security Hardware

RSS Feed   
Web Content Security Hardware Reports
 
Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Highlighting the Role of Response in Network Detection & Response
sponsored by Fidelis
PODCAST: Network Detection and Response (NDR) is the latest trend in network-based cybersecurity. NDR provides holistic visibility of the cyber terrain, produces high confidence detections and automates response in a cyber relevant time. In this podcast, listen as Fidelis’ COO, Craig Harber, discusses the role of response in NDR.
Posted: 18 Aug 2020 | Premiered: Aug 18, 2020

Fidelis

DDoS Response Guide
sponsored by Radware
WHITE PAPER: DDoS attacks can flood your network with malicious traffic, bringing applications down and preventing legitimate users from accessing your services. The good news, however, is that there is plenty to be done about it. In this white paper, explore 3 steps that will allow you to minimize the impact of a DDoS attack.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Radware

Cyber Security: 2021 Worst in Show
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: Throughout 2021, there has been a strong focus worldwide on how to combat cyber security attacks for most businesses. In this e-guide we take a look at the best of the worst of those attacks to happen throughout January to June this year and how businesses can learn/adapt from these attacks.
Posted: 09 Jun 2021 | Published: 09 Jun 2021

ComputerWeekly.com

What to include in an SD-WAN security checklist
sponsored by Silver Peak
EGUIDE: SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.
Posted: 09 Dec 2020 | Published: 07 Dec 2020

Silver Peak

Successful Network And Security Transformation Powers The Digital Enterprise
sponsored by Silver Peak
WHITE PAPER: Transform your WAN & security architectures to realize the full promise of the cloud.
Posted: 01 Dec 2020 | Published: 01 Dec 2020

Silver Peak

Public Safety Deployments
sponsored by Cradlepoint
RESOURCE: When public safety organizations implement new technologies to help ensure constant connectivity and secure communications, there are a number of considerations they must take into account. In this resource, explore a number of checklists that can help these organizations make the best purchasing decision possible.
Posted: 27 May 2020 | Published: 27 May 2020

Cradlepoint

WFH: How to Ensure End Users Stay Connected
sponsored by AppNeta
RESOURCE: In this resource, explore the different stages of network transformation that enterprises across the Globe suddenly had to reckon with as COVID-19 forced businesses to adopt “work from home” across their workforce.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

AppNeta

Comparison and Analysis of Security Aspects of LoRaWAN and NB-IoT
sponsored by Telekom Deutschland GmbH
WHITE PAPER: The two most commonly used LPWA technologies today are NarrowBand IoT (NB-IoT) and Long Range Wide Area Network (LoRaWAN). While more and more IoT use cases use NB-IoT or LoRaWAN technology, security specialists have observed IoT-related attacks increasing sharply for years. In this white paper, take a look at the security of NB-IoT and LoRaWAN.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

Telekom Deutschland GmbH

Fixed vs. Chassis-Based Switching
sponsored by Extreme Networks
WHITE PAPER: For years, a debate has raged on the pros and cons of fixed stackable switches versus chassis-based switches within the enterprise wiring closet. In this white paper, review the benefits and applicability of fixed versus Chassis-based Switching within the access layer of the enterprise campus network.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Extreme Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences