Appliances Reports

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

9 essential elements of network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Network security isn't a one-size-fits-all strategy. Dive into the various segments of network security, and learn how they overlap and interact with each other.
Posted: 08 Feb 2021 | Published: 08 May 2020

TechTarget ComputerWeekly.com

SD-WAN vs. SASE: What's the difference?
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: SASE and SD-WAN both connect geographically separate endpoints to each other and an organization's network resources, but the methods in which they do so differ in various ways. In this infographic, we highlight five key differences between the SASE and SD-WAN that could help businesses choose the right technology for their needs.
Posted: 11 Jan 2022 | Published: 11 Jan 2022

TechTarget ComputerWeekly.com

Advanced Attacks are Catching On - Here's What you can Do
sponsored by Kaspersky
EGUIDE: In this e-guide, Kaspersky Lab reports on how enterprises can upgrade their security programs against APT-style attacks. Uncover the effectiveness of network segmentation when it comes to detecting attacks that have bypassed your controls.
Posted: 02 Nov 2016 | Published: 27 Oct 2016

Kaspersky

HP TippingPoint Provides Next-Generation Network Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This informative paper examines an intrusion prevention system that is simple, reliable, and effective, ensuring that your network is kept safe from unwanted access or attacks.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

Hewlett Packard Enterprise

Perceptions about Network Security: Ponemon research
sponsored by Juniper Networks, Inc.
ANALYST REPORT: Ponemon Institute conducted a survey of over a thousand IT and IT security practitioners across Europe, studying their perspectives about the current threat landscape and what they believe the most effective strategies for keeping networks safe include. Uncover key findings and leverage this knowledge to build the right strategy for your business.
Posted: 07 Jun 2012 | Published: 01 Feb 2012

Juniper Networks, Inc.

Botnets: The dark side of cloud computing
sponsored by Sophos
WHITE PAPER: Botnets pose a serious threat to your network and they rival the power of today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. This paper details how to protect against the risk of botnet infection with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos

Next-generation firewalls are mainstream: What to expect
sponsored by Palo Alto Networks
EGUIDE: Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.
Posted: 19 Mar 2012 | Published: 15 Mar 2012

Palo Alto Networks

Web application firewalls: How they can help protect customers
sponsored by Astaro
EGUIDE: In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Astaro

The Touch-Free Future and Current Adoption Trends of SDN
sponsored by Juniper Networks, Inc.
EGUIDE: There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise.
Posted: 15 Nov 2016 | Published: 11 Nov 2016

Juniper Networks, Inc.