network security

Results 1101 - 1125 of 1132Sort Results By: Published Date | Title | Company Name

SD-WAN: Architecture Matters - 7 Questions to Ask When Evaluating SD-WAN Solutions

Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
sd-wan, wan, cloud security
    
VMware SD-WAN by VeloCloud

Whitepaper: The Total Economic Impact Of A Virtual Cloud Network (by Forrester)

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
    
VMware SD-WAN by VeloCloud

Whitepaper: Architecture matters, 7 questions (by Jim Metzler)

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
    
VMware SD-WAN by VeloCloud

Ten Reasons to choose vCloud Air

Published By: VMware, Inc.     Published Date: Apr 05, 2016
Get to hybrid cloud fast.
Tags : 
cloud, application, network, security, compliance, application integration, business intelligence, productivity
    
VMware, Inc.

Optimizing Network Monitoring in High Frequency Trading Environment

Published By: VSS Monitoring     Published Date: Jul 09, 2014
Learn how to optimize network monitoring in high-frequency trading (HFT) When a millisecond can cost a $1 million-plus, there's no tolerance for packet loss or latency. Download this white paper to learn how: The bursty data traffic of HFT can overwhelm networks & their legacy monitoring systems.
Tags : 
vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, high frequency trading, it management
    
VSS Monitoring

EMA Impact Brief

Published By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : 
ema, vss, 100g, visibility solutions, nvc, npb, it management
    
VSS Monitoring

Defining, Evaluating, and Designing Best-in-Class Network Security

Published By: WatchGuard     Published Date: Oct 16, 2012
Network security intrusions and data theft incidents grab headlines almost daily. Organizations rely on WatchGuard for network solutions. Read on to understand why WatchGuard is "best-in-class by design"
Tags : 
watchguard, security, database security, security, it security, it infrastructure, intrusion prevention, it management
    
WatchGuard

Vendor Landscape: Unified Threat Management

Published By: WatchGuard     Published Date: Oct 16, 2012
Network security may be old-school, but it is not passé; the right perimeter protection means more threats stay outside & more data stays inside. Learn more about capabilities that are available in a modern network perimeter UTM solution.
Tags : 
utm, watchguard, unified threat management, market research, report, security, infrastructure, data management
    
WatchGuard

Comparing price/performance: WatchGuard vs. Juniper, Fortinet, Cisco, and SonicWall

Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Tags : 
watchguard technologies, unified threat management, utm, network humming, security, firewall, vpn, tco
    
WatchGuard Technologies

Security from Above - How Cloud-based Security Delivers Up-to-the-Minute Network Protection

Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Read this white paper for a look at how and why the latest generation of in-the-cloud security really does deliver big dividends for your organization's network security posture.
Tags : 
watchguard technologies, cloud-based security, protection, network security, malware threats, cybercriminal, anti spam, anti spyware
    
WatchGuard Technologies

Cyber-bullying: A Digital Epidemic

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!
Tags : 
watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor
    
WatchGuard Technologies

Data Loss Prevention: Keep Sensitive Data-In-Motion Safe

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Whether your data loss is accidental or malicious, you need to gain insight into the magnitude of your data loss problem, identify security gaps, and develop a proactive approach to stop data loss before it happens.
Tags : 
watchguard xcs, data loss protection, data loss prevention, data breach, content analysis, contextual analysis, dlp solution, network security appliance
    
WatchGuard Technologies

Take Back Control: Increase Security, Empower Employees, Protect the Business

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Tags : 
watchguard application control, network app, p2p applications, network security appliance, watchguard xtm, firewall, threat management, application security
    
WatchGuard Technologies

A Changing Threat Landscape for the Retail Industry

Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks
    
WatchGuard Technologies

Virtual Support Networks: Ten Tips for Delivering Managed Services to On-Site Systems

Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan
    
WebEx

Survey: Remote Users Expose Companies to Cybercrime

Published By: Webroot     Published Date: Sep 18, 2013
Webroot conducted research on web security in the US and the UK. As remote users expand the security perimeter, the majority of companies reported significant effects in the form of increased help desk time, reduced employee productivity and disruption of business activities. The impacts of web-borne attacks are also more severe for companies with employees who have remote access to the corporate network or other corporate online resource via their laptops, tablets or smartphones. • 90% of companies agree that managing the security of remote users is extremely challenging • Twice as many companies with remote users reported Web-borne attacks by criminals, which compromised the security of customer data • 50% of firms with remote users say web-borne attacks impacted company financials
Tags : 
security, remote users, cybercrime, web attacks, malware, phishing, mobile browser security, mobile device
    
Webroot

Phishing 2.0

Published By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : 
phishing, campaigns, antiphishing, security, social media, malware, block, network
    
Webroot Inc

Webroot SecureAnywhere Business Endpoint Protection eBook

Published By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : 
endpoint protection, networks, security software, endpoint devices, security
    
Webroot Inc

Why Your Next Generation Firewall Protection Isn't Enough

Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc

Manage Mobile App

Published By: Webroot UK     Published Date: Dec 20, 2013
The workplace technology landscape has changed dramatically over the past five years, and the security threats have changed along with it. This whitepaper will show you the growing factors that IT professionals can't afford to ignore.
Tags : 
webroot, mobile apps, mobile workers, mobile devices, accessing networks, workplace technology, security threats, infographic
    
Webroot UK

Securing the Social Network: How to Embrace Emerging Technologies Without Putting Data at Risk

Published By: Websense     Published Date: Sep 27, 2010
Social media isn't coming to banking institutions-it's here. For banks and their customers, social networks such as Facebook, LinkedIn and Twitter have become an integral part of everyday life.
Tags : 
websense, social network, facebook, linkedin, twitter, data risk, data security, web security
    
Websense

Download your copy of the Miercom Security Effectiveness Test Report today.

Published By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : 
miercom, security, effectiveness, report, protect, network, threats, solutions
    
Websense

Intel® AtomT Pineview-based Networking Platforms

Published By: WIN Enterprises     Published Date: Jan 06, 2011
Paper provides background on Intel Atom processor for embedded market, the next-generation Atom Pineview CPUs, and platform-level solutions.
Tags : 
embedded atom processor, pineview processor, networking, firewall, network security, ip pbx, anti-virus, vpn
    
WIN Enterprises

Security in the Age of Enterprise Technology

Published By: Windstream     Published Date: Mar 19, 2015
The following report will help you gain advantage through proactive use of network security.
Tags : 
windstream communications, network security, risk management, internet security, security management, wireless security, data protection, business technology
    
Windstream

Top Strategies for Developing a Secure Network

Published By: World Data Products, Inc.     Published Date: Oct 04, 2010
This three section white paper explains strategies on how to develop, apply, and maintain a security program.
Tags : 
world data products, secure network, security policies, monitoring and testing, monitoring, network security, test and measurement, storage management
    
World Data Products, Inc.
Start   Previous    32 33 34 35 36 37 38 39 40 41 42 43 44 45 46    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.