network security

Results 326 - 350 of 1153Sort Results By: Published Date | Title | Company Name

Eight Central Management Features to Ensure Network Survival

Published By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network survival, network security management, best practices, firewalls, hacker detection
    
McAfee

Eight Central Management Features to Ensure Network Survival

Published By: McAfee     Published Date: Jan 20, 2015
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, networking
    
McAfee

Eight Central Management Features to Ensure Network Survival

Published By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
    
Intel Security

Eight Must-Have Features for Ultimate Network Security Resource Optimization

Published By: McAfee     Published Date: Sep 15, 2014
The need for robust network security is growing, but IT security teams, resources, and budgets are shrinking at many organizations. That doesn’t mean you have to scale down your growth or skimp on key IT security areas, but it does mean you need to optimize your resources, starting with your network firewall team. Resource optimization involves the automation and streamlining of operational processes and management workflows so that your IT team members can be freed up to focus their time, skills, and expertise on priority projects. Furthermore, optimizing your resources helps preserve your budget while eliminating budgetary conflicts and slashing administrative costs.
Tags : 
network security, it security, firewall, resource optimization, security management
    
McAfee

Eight Situational Awareness Tools Your Network Is Not Safe Without

Published By: McAfee     Published Date: Sep 15, 2014
With networks sprawling to massive proportions and malicious activity hitting hard, fast, and constantly evolving, situational awareness is more vital than ever in keeping your network secure. Situational awareness refers to the continuous monitoring of your network by analyzing bulk data collected from sources across the board. In other words, it delivers a detailed overview of all areas of your network so you know exactly what’s going on through increased visibility and response capabilities.
Tags : 
best practices, network security, it security, security management, threat response, hacker detection
    
McAfee

Eight Situational Awareness Tools Your Network is Not Safe Without

Published By: McAfee     Published Date: Jan 20, 2015
The only way to be prepared is to be aware. Make sure you have the right tools for optimal situational awareness of your network security.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, networking
    
McAfee

Eight Situational Awareness Tools Your Network is Not Safe Without

Published By: Intel Security     Published Date: Jan 20, 2015
With networks sprawling to massive proportions and malicious activity constantly evolving, situational awareness is more vital than ever in keeping your network secure. But it’s not built on skills alone. Eight tools are equally as essential for keeping your situational awareness—and your network—alive.
Tags : 
situation awarenss, network awareness, network security tools, essential network tools, next generation firewall, next generation firewall features, ngfw, security
    
Intel Security

Eight Ways to Improve Your Network High Availability

Published By: McAfee     Published Date: Sep 15, 2014
High availability is a must in our current cyberculture, and several advanced features that should be part of your next-generation firewall can help ensure that your network and your enterprise are continually up and running.
Tags : 
network high availability, firewall, best practices, it security management
    
McAfee

Eight Ways to Improve Your Network High Availability

Published By: McAfee     Published Date: Jan 20, 2015
Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
McAfee

Eight Ways to Improve Your Network High Availability

Published By: Intel Security     Published Date: Jan 20, 2015
Enterprises worldwide rely on network high availability for business continuity. Find out how the capabilities that are part of your next-generation firewall can help ensure that your network is up and running all day, every day.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
Intel Security

Eliminate Blind Spots in SSL Encrypted Traffic

Published By: Venafi     Published Date: Mar 26, 2015
Gartner expects that by 2017, more than 50% of network attacks will use SSL/TLS. Yet most organizations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative. Download this Solution Brief: Eliminate Blind Spots in SSL Encrypted Traffic to learn how.
Tags : 
blind spots, ssl encrypted traffic, network attacks, tls, decryption, security threats
    
Venafi

Eliminating Data Center Compromise With Next-Generation Firewalls

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Palo Alto Networks uniquely delivers on the network security demands found in both types of data center environments.
Tags : 
palo alto, enterprises, infrastructure, business technology
    
Palo Alto Networks

Eliminating Your SSL Blind Spot: The Solution to Managing and Securing HTTPS Traffic

Published By: Secure Computing     Published Date: Aug 21, 2009
This white paper discusses how HTTPS filtering (SSL scanning) from Secure Computing provides companies with the means to counter these threats by fully extending their Internet usage policies to HTTPS traffic, and thereby proactively closing that last known major network security hole.
Tags : 
ssl, vpn, secure socket layer, virtual private network, traffic management, security management, https, internet security
    
Secure Computing

EMA Impact Brief

Published By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : 
ema, vss, 100g, visibility solutions, nvc, npb, it management
    
VSS Monitoring

EMA report: Data Capture and Network Forensics, State of the Market

Published By: IBM     Published Date: Feb 11, 2015
In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92.
Tags : 
data capture, network forensices, ibm, incident forensics, it security tools, security, it management, enterprise applications
    
IBM

EMA Report: Understanding the Value of Application-Aware Network Operations

Published By: Gigamon     Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs). EMA recommends that today’s network operations teams modernize their approach with full application visibility. EMA research has found that network teams are increasingly focused on directly addressing security risk reduction, service quality, end-user experience, and application performance. All of these new network operations benchmarks will require deeper application-level visibility. For instance, a network team focused on service quality will want to take a top-down approach to perfo
Tags : 
    
Gigamon

EMA: Defining the Future of Network Visibility Fabrics

Published By: Gigamon     Published Date: Mar 26, 2019
Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unnecessary tool upgrades due to bandwidth increases -- resulting in decreased costs, improved tool utilization and optimized investments in existing networking and security tools. Learn more by downloading this report!
Tags : 
    
Gigamon

EMA: Defining the Future of Network Visibility Fabrics

Published By: Gigamon     Published Date: Jun 10, 2019
Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unnecessary tool upgrades due to bandwidth increases -- resulting in decreased costs, improved tool utilization and optimized investments in existing networking and security tools. Learn more by downloading this report!
Tags : 
    
Gigamon

EMA: Defining the Future of Network Visibility Fabrics

Published By: Gigamon     Published Date: Feb 20, 2019
Security and network performance tools are unable to or weren’t built to handle and analyze traffic at higher bandwidths. Read Enterprise Management Associates new research report, “Next Generation Network Packet Brokers: Defining the Future of Network Visibility Fabrics” to learn how to reduce unnecessary tool upgrades due to bandwidth increases -- resulting in decreased costs, improved tool utilization and optimized investments in existing networking and security tools. Learn more by downloading this report!
Tags : 
    
Gigamon

Email and Web Security Try & Buy

Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco

Emerging Network Security Technologies

Published By: Juniper Networks     Published Date: Sep 10, 2014
Download this Ponemon Institute Report on the value of emerging network security technologies. Get the views of 4,500 IT security practitioners and find out which of the rapidly emerging technologies really are effective.
Tags : 
network security, security technology, emerging technology, juniper, best practices
    
Juniper Networks

EMM Real Benefits in Today's Mobile World

Published By: VMware     Published Date: Feb 24, 2017
The economy isn't standing still. For your business to succeed, your employees shouldn't either. With your network infrastructure as a strong pair of legs, the right combination of a seamless user experience and a secure workspace will give users -- and your organization -- the ability to move forward with mobility. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Tags : 
    
VMware

Encryption with WAN Optimization

Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet, security, wireless
    
SafeNet

End Point Control: Secure Remote Access with Reduced Risk and Increased IT Control

Published By: Aventail     Published Date: Aug 21, 2009
This white paper summarizes the capabilities of Aventail End Point Control and explains the range of features that increase IT control and data protection by giving users access that's finely tuned to the risks of their environment.
Tags : 
vpn, access control, ssl, network security, data protection, wireless security, aventail, remote access
    
Aventail

Endpoint Security

Published By: Kaseya     Published Date: Mar 12, 2015
Fighting Cyber Crime with Automated, Centralized Management
Tags : 
cyber crime, automation management systems, network security, software applications, network infrastructure, infrastructure, network management, network performance
    
Kaseya
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.