Hardware  >   Security Hardware  >   Network Security Hardware  >  

Web Intrusion Prevention Appliances

RSS Feed   
Web Intrusion Prevention Appliances Reports
 
The Role of DDI in Sase Deployments
sponsored by Infoblox
ANALYST REPORT: The need to re-architect the network has given rise to a flurry of software-defined deployments, but these have proven to bring management and security challenges. However, a new market has recently emerged that tightly couples security with the network: the Secure Access Service Edge (SASE). Download this research report to learn more about SASE.
Posted: 28 Sep 2020 | Published: 31 Aug 2020

Infoblox

SASE: A How to Guide
sponsored by Apcela
WEBCAST: In this webcast, join Mark Casey and Kunal Thakkar of Apcela as they show how enterprises are creating a Secure Access Service Edge (SASE) network security architecture built for the cloud.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Apcela

Constructing a Cloud-first WAN and Security Architecture Webinar
sponsored by Silver Peak
WEBCAST: In this on-demand webinar, you will hear how Builders FirstSource, the largest supplier of professional-grade building products in the U.S. transformed both their WAN and security architecture.
Posted: 02 Dec 2020 | Premiered: Dec 2, 2020

Silver Peak

What to include in an SD-WAN security checklist
sponsored by Silver Peak
EGUIDE: SD-WAN technology can improve WAN security in a variety of ways. Simply migrating to a viable SD-WAN offering brings some benefits. But SD-WAN tools also provide security features to protect the traffic they manage. In this e-guide, learn what you should include in your SD-WAN security checklist.
Posted: 09 Dec 2020 | Published: 07 Dec 2020

Silver Peak

Networks Start to Get SASE in 2020
sponsored by Apcela
WHITE PAPER: Companies engaged in digital transformation efforts already understand that security and network services are converging. Now, that convergence has a new name: “secure access service edge,” or SASE. In this white paper, learn more about the SASE model and how it can help your organization by placing access control closer to the user.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Apcela

Definitive Guide to Next-Generation Network Packet Brokers
sponsored by Gigamon
ANALYST REPORT: Download the Definitive Guide to Next-Generation Network Packet Brokers (NGNPBs) and discover the immediate benefits of shifting your infrastructure strategy to include NGNPBs. You’ll experience expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Gigamon

[Webinar] Arrow Exterminator - Secrets of Remote Work Success
sponsored by NWN Corporation
VIDEO: In June of 2019 Arrow Exterminator began its partnership with NWN. During this partnership, NWN helped Arrow migrate to an NWN hosted Cisco call manager and upgrade their internet equipment. To learn more about this partnership and how NWN helped Arrow transition to a remote workforce amidst the COVID-19 pandemic, download this case study.
Posted: 11 Nov 2020 | Premiered: 11 Nov 2020

NWN Corporation

Denial-of-Service (DoS) Secured Virtual Tenant Networks (VTN)
sponsored by NEC Corporation of America
WHITE PAPER: This crucial paper discusses the evolution of DDoS attacks and examines an SDN solution that detects and mitigates potential attacks almost instantly, ensuring that your network is kept up and running.
Posted: 03 Jun 2014 | Published: 03 Jun 2014

NEC Corporation of America

6 Crucial Incident Response Policy Mistakes to Avoid
sponsored by Delta Risk
EGUIDE: Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad.
Posted: 20 Sep 2016 | Published: 16 Sep 2016

Delta Risk

Building an Application Security Program: Why Education is Key
sponsored by Synopsys
EGUIDE: This expert guide takes a look at the development process of application security as well as two types of testing that can be beneficial when analyzing security failures.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences