appliance

Results 251 - 275 of 386Sort Results By: Published Date | Title | Company Name

Encryption with WAN Optimization

Published By: SafeNet     Published Date: Jan 14, 2014
WAN optimization is a widely used technology that improves the efficiency of network data transmission. SafeNet Ethernet encryptors are Layer 2 (data link) appliances that secure traffic at wire speeds across wide area Ethernet services to provide protected information transmission. This paper discusses the scenario where both encryption and optimization are used across a WAN and the design considerations required.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet, security, wireless
    
SafeNet

Understanding Layer 2 Encryption

Published By: SafeNet     Published Date: Jan 14, 2014
SafeNet CN high speed network data encryption devices are purpose built hardware appliances that secure data transmitted across Layer 2 networks. The CN series platforms provide highly secure, full line rate transparent encryption for data moving across both dark Fibre and metro, or wide area Ethernet networks in point-point, hub & spoke, or any meshed environment.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet, wireless, network security
    
SafeNet

Storwize eGuide, 2012

Published By: IBM     Published Date: Jan 09, 2014
How can your midsize business meet new demands for data storage with limited resources? In this eguide, you’ll find out that this innovative solution can radically improve storage performance—while minimizing expenses
Tags : 
ibm, storwize eguide, data storage, modern technology, virtual storage, gartner research, innovative data, storage maintenance
    
IBM

Controlled and Secure Access to Public and Private Clouds

Published By: McAfee     Published Date: Oct 28, 2013
Watch this 3 minute video for a unique way of accessing public and private cloud services without losing governance and situational awareness.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Optimized and Uninterrupted Network Traffic

Published By: McAfee     Published Date: Oct 28, 2013
Eliminate high costs associated with MPLS and BGP with a new approach. This short video will show how secure and resilient connectivity between global sites is possible while increasing network bandwidth and quality of service.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Deploy and Maintain Thousands of Security Devices in Seconds

Published By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
    
McAfee

Whitepaper: Putting Web Threat Protection and Content Filtering in the Cloud

Published By: Webroot     Published Date: Sep 18, 2013
This Webroot whitepaper compares deploying secure web gateways as software or appliances on-premises vs. as a cloud-based service. Lower cost, fast implementation, rapid scalability and less administration are all good reasons to adopt SaaS and cloud-based applications. In addition to these benefits, cloud-based secure web gateways can also provide better security and faster performance than appliances or local servers. It discusses a number of advantages of cloud-based solutions that appliances cannot match, such as: • Better defense against zero-day threats and spam servers • More comprehensive signature and URL database • Supports remote users more securely and without the cost of putting servers in every location
Tags : 
web threat, content filtering, the cloud, security, web gateway, cloud-based applications, business technology, cloud computing
    
Webroot

HP 2012 Cyber Risk Report

Published By: HP - Enterprise     Published Date: Sep 16, 2013
This paper touches upon the following topics: -Critical vulnerabilities are on the decline, but still pose a significant threat -Mature technologies introduce continued risk -Mobile platforms represent a major growth area for vulnerabilities -Web applications remain a substantial source of vulnerabilities -Cross-site scripting remains a major threat to organizations and users -Effective mitigation for cross-frame scripting remains noticeably absent
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise

HP 2012 Cyber Risk Report Infographic - Mobile Vulnerabilities

Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk.
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise

HP 2012 Cyber Risk Report Infographic - Vulnerability Trends

Published By: HP - Enterprise     Published Date: Sep 16, 2013
HP Enterprise Security provides a broad view of the vulnerability landscape, ranging from industry-wide data down to a focused look at different technologies, including web and mobile. The goal of this report is to provide the kind of actionable security that intelligence organizations need to understand the vulnerability landscape as well as best deploy their resources to minimize security risk. Download this infographic for more info!
Tags : 
internet security, intrusion detection, intrusion detection/ forensics, intrusion prevention, mobile security, network security appliance, security, security policies
    
HP - Enterprise

Tolly Test Report: Antivirus Effectiveness VMware vSphere 5 Virtual Environments

Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec

De-duplication appliances: Can HP put a dent in EMC’s hegemony?

Published By: Hewlett-Packard     Published Date: Aug 02, 2013
The early days of the de-duplication target market could be characterized as the Wild West according to 451 Research, with a slew of startups shooting it out in an emerging market with tremendous potential.
Tags : 
de-duplication, appliances, emc, infrastructure, storage management, application integration, return on investment, data deduplication
    
Hewlett-Packard

Free Virtual Appliance for Application Performance Monitoring End

Published By: ExtraHop     Published Date: Jul 29, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
virtual, applications, technology, network, web, vdi, database, storage
    
ExtraHop

Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, appliance, virtual, physical, saas, hybrid, access control, application security
    
Blue Coat Systems

Citrix XenServer Backup & Replication

Published By: PHD Virtual     Published Date: Jul 09, 2013
Citrix XenServer Backup & Replication
Tags : 
phd virtual, citrix xenserver, phd virtual, virtualized footprint, virtual backup appliance, security
    
PHD Virtual

VMware vSphere Backup & Replication

Published By: PHD Virtual     Published Date: Jul 08, 2013
VMware vSphere Backup & Replication
Tags : 
phd virtual, free offer, vmware backup & recovery, virtual backup appliance, vsphere hypervisor, vba deploys, virtual backup appliance, security
    
PHD Virtual

Building a Web Security Architecture: Physical Appliance, Virtual Appliance, SaaS, or Hybrid - ESG

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
CISOs recognize the risk threats such as phishing, fake antivirus (AV), and search engine poisoning bring, and are anxious to invest in web security technology to safeguard users. Unfortunately, it’s not so easy. Many security executives are struggling to answer questions about the most effective approach. This ESG white paper from BlueCoat explains why some CIOs are struggling to manage security in an increasingly complex and mobile landscape, and offers advice for what they should be looking for in web security.
Tags : 
web security, web threats, physical appliance, virtual appliance, saas, security, technology, data management
    
Blue Coat Systems

Australian Building Products Leader Easily Achieves Disaster Recovery Objectives with Silver Peak

Published By: Silver Peak     Published Date: Jun 24, 2013
See how Australia's largest independent locally-owned manufacturer and distributor of wood-based building products, Gunnersen, has implemented Silver Peak Systems to ensure its recovery point objectives are achieved.
Tags : 
silver peak, virtual appliances, disaster recovery, wan bandwidth, bandwidth management, wide area networks, collaboration, business technology
    
Silver Peak

Riverbed vs Silver Peak: WAN Optimization Vendors Put to the Test

Published By: Silver Peak     Published Date: Jun 24, 2013
Enterprises are relying on WANs to carry more data than ever. With cloud computing, offsite disaster recovery and big data on the rise, it's more important than ever for IT professionals to boost application performance across the WAN. However, times are changing. Instead of deploying a physical WAN optimization appliance to improve application performance, the industry is moving to a better approach - virtual WAN acceleration software. It can be downloaded in minutes, runs almost anywhere, and controlled with the click of a mouse for maximum flexibility. In this report we not only explore the requirements for virtual WAN optimization but compare how Silver Peak's virtual WAN acceleration stacks up against Riverbed's physical Steelhead appliance.
Tags : 
enterprises, cloud computing, offsite disaster recovery, big data, technology, virtual wan, software, optimization
    
Silver Peak

A competitive review of SOA Appliances

Published By: IBM     Published Date: May 22, 2013
SOA appliances have matured considerably over the last few years. As they have established themselves more firmly in the SOA landscape, vendors have developed a better understanding of requirements, resulting in a level of commonality in some of the key underlying functions such as providing a secure gateway for accessing SOA services.
Tags : 
soa, ibm, soa appliances, software, requirements, quality assurance, service oriented architecture
    
IBM

Citrix TriScale Technology Brings Cloud Scale to Enterprise Networks

Published By: Citrix NetScaler     Published Date: May 06, 2013
Citrix TriScale drives unprecedented network scalability, enabling IT teams to build enterprise cloud networks that can Scale Up performance 5x, Scale Out capacity by 32x, and Scale In consolidation by running up to 40 appliances in a single platform.
Tags : 
cloud scale, enterprise netwroks, citrix triscale technology, scalability, citrix, knowledge management, enterprise applications
    
Citrix NetScaler

HP StoreOnce is "Better Together" with HP Data Protector 7

Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Apr 11, 2013
This paper looks at the benefits to be realized in the combined scenario of HP StoreOnce appliances being used with HP’s own Data Protector 7 backup software while considering the topic of “where” the deduplication occurs.
Tags : 
hp storeonce, leadership, deduplication, industry leadership, emc, data domain, backup system, storeonce
    
Sponsored by HP and Intel® Xeon® processors

De-duplication appliances: Can HP put a dent in EMC’s hegemony?

Published By: Sponsored by HP and Intel® Xeon® processors     Published Date: Apr 11, 2013
The early days of the de-duplication target market could be characterized as the Wild West, with a slew of start-ups shooting it out in an emerging market with tremendous potential. HP has a good chance of joining the ranks of IBM and EMC.
Tags : 
de-duplication appliances, emc, hegemony, acquire, de-duplication, xeon
    
Sponsored by HP and Intel® Xeon® processors

Free Virtual Appliance for Application Performance Monitoring

Published By: ExtraHop     Published Date: Apr 03, 2013
The ExtraHop Discovery Edition is a free virtual appliance will help you to discover the performance of your applications across the network, web, VDI, database, and storage tiers. Get yours today!
Tags : 
it operational intelligence, application performance management, application performance monitoring, application monitoring, network performance management, network performance monitoring, network monitoring, infrastructure performance monitoring
    
ExtraHop

The Evolution and Value of Purpose-Built Backup Appliances

Published By: Symantec     Published Date: Mar 11, 2013
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
backup and recovery, storage virtualization, disaster recovery, application integration, data integration, data protection, virtualization
    
Symantec
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.