Security Devices Research
Sponsored by: SearchSecurity.com
This classroom provides tactics for validating the performance and effectiveness of key network security technologies and strategies for ensuring they work together to provide pervasive protection.
Sponsored by: Citrix
Download this exclusive white paper now to learn about the current state of DoS landscape, common approaches for dealing with DoS attacks, and much more.
Sponsored by: Fortinet, Inc.
This white paper first defines next-generation firewalls, secure web gateways, and their capabilities, and then specifically discusses the Fortinet FortiGate NGFW and the results of ESG Lab's evaluation and testing of the device.
Sponsored by: ESET
This white paper examines the looming threat horizon that is forcing companies to reexamine their endpoint security functions and discusses ESET’s solution for integrated security management that is built around its advanced heuristic technology.
Sponsored by: Sophos, Inc.
This guide looks at two of the most popular threat management platforms on the market and explores the benefits of each.
Sponsored by: Riverbed Technology, Inc.
PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.
Sponsored by: Imperva
This guide takes a look at 10 things that every web application firewall should provide.
Sponsored by: Novell, Inc.
PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.
Sponsored by: Juniper Networks, Inc.
BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Sponsored by: Cisco Systems, Inc.
In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them