network security solutions

Results 1 - 25 of 92Sort Results By: Published Date | Title | Company Name
By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
     Viavi Solutions
By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity
     WatchGuard Technologies
By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata, it management
     Varonis
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
     Intel Security
By: IBM     Published Date: Feb 11, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.
Tags : network security, threat landscape, network security solutions, network defense, security challenges, security, it management, business technology
     IBM
By: IBM     Published Date: Apr 09, 2015
A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and peformance.
Tags : data security, ibm, risk management, network security, security threat, networking, security, it management, knowledge management, data management
     IBM
By: Citrix Systems     Published Date: Nov 10, 2014
Many organizations are struggling with network infrastructure that is vastly outdated, and with the rise in cloud computing, the time to upgrade is now. Cloud-based network solutions for application delivery are a great way for businesses to ensure high levels of performance, security and flexibility. This guide explores two solutions that organizations use to build a network for today's evolving enterprise and how you can fully address cloud requirements for secure application delivery. Read now for this vital information on cloud networking!
Tags : optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, security, data center
     Citrix Systems
By: Citrix Systems     Published Date: Feb 14, 2019
"Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: - Why a holistic security approach is crucial - What a new security approach looks like - How Citrix solutions provide security across your entire stack"
Tags : 
     Citrix Systems
By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Faced with degrading network performance and the need to drive global expansion, Measurement Specialties partnered with Virtela to design, implement and manage a high-performance, multi-carrier MPLS network across all twelve of their global sites.
Tags : virtela, network performance, multi-carrier mpls network, original equipment manufacturers, point-to-point connections, network and security solutions
     Virtela Communications, Inc.
By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
     Centrify Corporation
By: McAfee     Published Date: Apr 25, 2012
Download this whitepaper to learn how to combine modern authentication needs with identity and access management.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, it management, data management
     McAfee
By: McAfee     Published Date: Oct 28, 2013
Watch this 3 minute video for a unique way of accessing public and private cloud services without losing governance and situational awareness.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security
     McAfee
By: PulseSecure     Published Date: Apr 01, 2015
Learn how to craft enterprise plans for your organization’s mobile security and see how this will allow your organization to properly implement a Bring Your Own Device environment to improve employee’s productivity.
Tags : mobile devices, corporate network, security, secure access solutions, it management, enterprise applications, business technology
     PulseSecure
By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers, virus, spam, malware, application security
     Palo Alto Networks
By: WatchGuard     Published Date: Oct 16, 2012
Network security intrusions and data theft incidents grab headlines almost daily. Organizations rely on WatchGuard for network solutions. Read on to understand why WatchGuard is "best-in-class by design"
Tags : watchguard, security, database security, security, it security, it infrastructure, intrusion prevention, it management, data management
     WatchGuard
By: McAfee     Published Date: Apr 25, 2012
A new approach to security is needed. By adopting a mass security operation model, organizations can deploy and operate enterprise level security with fewer resources. Download this whitepaper to learn more.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, security, storage
     McAfee
By: McAfee     Published Date: Oct 28, 2013
View this demonstration to see how masses of security devices in complex and geographically diverse organizations can be operated from one single point of operations in a way that is cheaper, easier, faster, and safer.
Tags : stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, networking, security
     McAfee
By: Symantec.cloud     Published Date: Mar 02, 2011
The mobile workspace has created problems for IT, including policy enforcement, attack from untrusted wireless networks, and physical data theft. This white paper examines how cloud-based security solutions can protect distributed workers.
Tags : symantec.cloud, messagelabs, distributed workforce management, cloud-based security, it security, remote worker, wireless network, laptop, mobile device
     Symantec.cloud
By: Forcepoint     Published Date: Jan 03, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : next generation firewall, ngfw, firewall, network security, branch security, distributed offices, data security, network security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : next generation firewall, ngfw, firewall, network security, branch security, distributed offices, data security, network security
     Forcepoint
By: Juniper Networks     Published Date: Jun 22, 2017
Juniper Networks works with leading companies around the world to increase the service agility of their networks. With simple, open, and smart networks, financial services firms can bring innovative new services to market faster and at lower costs. They can leverage Juniper’s expertise, experience, and partner ecosystem to build agile, service-aware networks. Juniper is a leader in high-performance, highly reliable routing, switching, and security, with solutions deployed in some of the most complex networks in the world across banking, capital markets, and insurance providers. A broad ecosystem of solution, services, delivery, and consulting partners can provide businesses with a complete offering that enables innovation.
Tags : financial services, financial security, data security, cloud security, network security, business protection
     Juniper Networks
By: AWS     Published Date: Nov 07, 2018
To best support global users and customers, enterprises require seamlessly connectivity between branch office locations, applications, and workloads hosted in the cloud. Many WAN solutions are ill-equipped for this task because they are generally rigid, complex to configure, and expensive to maintain. IoT adoption, a dramatic increase of the number of network devices, and the sophistication of security threats further compounds this challenge. Geographically-distributed devices need secure cloud connectivity, limiting the ability of existing WAN solutions to fulfill the need of distributed organizations. Cisco SD-WAN on Amazon Web Services (AWS) is an overlay WAN architecture that is designed to address modern enterprise cloud applications and workloads, heterogeneous WAN connectivity, distributed global workforces, and other business needs that traditional WAN solutions cannot meet. Learn more by downloading this solution brief. Join our webinar to learn -How to migrate a data ce
Tags : 
     AWS
By: McAfee     Published Date: Sep 15, 2014
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network survival, network security management, best practices, firewalls, hacker detection
     McAfee
By: Intel Security     Published Date: Jan 20, 2015
Centralized and accurate network security management is more than a trend—it is quickly establishing itself as the only means of network survival. Old-school point solutions, where each solution served a single purpose at a particular point in the network, are quickly becoming unwieldy, if not impossible, to manage. Larger enterprises may have hundreds of point products throughout their network, and managing them effectively, efficiently, and securely can only be done through a centralized network security management solution. Look for eight key features in your network security management solution to ensure that your network not only survives but thrives.
Tags : network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation, security
     Intel Security
By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
     Focus
Start   Previous   1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com