Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

gateway

Results 151 - 175 of 219Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Aug 18, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, security
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises, networking
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
More than ever, the data center is a gateway to opportunity, responsible for bringing together the data, applications, and IT resources needed to support growth and innovation. At Cisco we have the opportunity to observe how data center infrastructure is evolving in response to market and technology trends. In no particular order, here are five important strategies we see companies using to overcome the limitations of traditional IT infrastructure and transform their data centers to support innovation and growth.
Tags : 
data center, consolidation, server virtualization, new applications, it management
    
Cisco
Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, it management
    
Cisco
Published By: Riverbed     Published Date: Sep 05, 2014
Information is becoming the currency of the 21st century, and organizations of all sizes are creating more information than ever before. Frequently, organizations struggle with how best to balance storage requirements with available budgets. The benefits of greater storage capacity are clear: better change management and roll-back, easier archival and discovery, reliable backup and recovery. But to continually grow on-site capacity requires unsustainable investment and introduces unnecessary risk. Prominent cloud service providers present an appealing alternative with their vast amounts of storage, offering low cost, high availability, and built-in redundancy. Riverbed’s Whitewater® family of cloud storage gateways is a drop-in replacement for existing tape- and diskbased backup targets, cuts backup costs 30-50% compared to tape and disk, and provides effective DR capability with minimal effort.
Tags : 
data security, cloud storage, gateways, requirements, archival, discovery, management
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
This paper examines various technologies and strategies that have traditionally been the basis for DR planning, as well as new methodologies that have arisen around the public cloud. For those situations where a cloud-based DR strategy makes sense, specific best practice recommendations and implementation steps are described.
Tags : 
recovery, public cloud, cloud storage, gateways, dr planning, recommendations, implementation
    
Riverbed
Published By: Riverbed     Published Date: Sep 05, 2014
Storing data in the cloud using a Whitewater™ cloud storage gateway from Riverbed Technology overcomes what is becoming a serious challenge for IT departments: how to manage the vast, and ever-growing, amount of data that must be protected. Whitewater eliminates concerns about data security, data transmission speeds over the Internet, and data availability, while providing great flexibility and a favorable return on investment. Moving data to the cloud replaces the high costs of tape and disk storage systems with a pay-as-you-go cloud storage tier. This paper makes the business case for cloud storage, outlining where capital and operational costs can be eliminated or avoided by using the cloud for backup and archive storage.
Tags : 
data storage, cloud, it departments, security, transmission speeds
    
Riverbed
Published By: iboss     Published Date: Jan 22, 2018
While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.
Tags : 
iboss, device security, intrusion, network security, distributed computing
    
iboss
Published By: iboss     Published Date: Jan 22, 2018
When the General Data Protection Regulation (GDPR) replaces the European Union’s Data Protection Directive 95/46/ec on May 25, 2018, businesses across the globe will be subject to a wealth of potential fees and penalties for non-compliance.
Tags : 
iboss, gdpr, gdpr compliance, compliance, general data protection regulation, remote access
    
iboss
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Tags : 
citrix, security, remote access, network performance, network security, remote network management
    
Citrix Systems, Inc.
Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.
Tags : 
citrix, security, remote access, delivery, infrastructure
    
Citrix Systems, Inc.
Published By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp
    
NetCom Info
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection, blue coat, insider threats, security, social media risks, twitter risks, facebook risks, linkedin risks, secure web gateway, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
By exploiting popular places on the Internet, such as search engines, social networking and email, malnets have become very adept at infecting many users with little added investment.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
Organizations must be able to extend the boundaries of their corporate network to provide consistent Web security protection, policies and reporting for all users on any device or network.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Mar 23, 2012
This paper talks about the strengths and weaknesses of on-premise and could deployments and which organizations need hybrid solution.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Apr 05, 2012
This Webcast , discusses how hybrid web security can tackle these tough challenges. Hear pros and cons of various deployment options and key considerations for even the most cloud-hesitant security professionals.
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses, security, attacks, threats, application performance monitoring, enterprise applications
    
Blue Coat Systems
Published By: Aventail     Published Date: Aug 21, 2009
In this white paper mobility expert Peter Rysavy discusses how Aventail SSL VPNs provide one secure gateway for access from any device, ensuring only authorized users get access to resources. And, with access that's optimized for specific device types, users only see information that's relevant to them at the time of access.
Tags : 
ssl, vpn, encryption, secure remote access, ssl vpn, secure mobile, mobile workers, secure mobile device, network security, aventail
    
Aventail
Published By: IBM     Published Date: Mar 04, 2009
Download IBM® Lotus® Sametime® Standard V8.0, a platform for unified communications and collaboration that combines security features with an extensible, open solution including integrated Voice over IP, geographic location awareness, mobile clients, and a robust Business Partner community offering telephony and video integration. Lotus Sametime Standard V8.0 expands on the existing instant messaging, Web conferencing, VoIP, point-to-point video, mobile clients, external IM gateway, and extensible client with additional platform support and enhancements to the end user experience, administration, and performance.
Tags : 
ibm, lotus, sametime, communications and collaboration, instant messaging, web conferencing, voip, point-to-point video, mobile clients, external im gateway, extensible client, wireless, enterprise applications
    
IBM
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Mobile and remote workers of all types need high-quality connections to the Internet and to their corporate networks. They need connections from branch offices, homes, airports, hotels and other locations around the world. This truly becomes a security challenge as network managers scramble to meet these needs.
Tags : 
mobile workforce, remote access, network security, wireless security, off-site, remote workers, internet security, internet security systems, remote network management
    
Internet Security Systems
Published By: Texas Instruments     Published Date: Nov 06, 2006
Read how the Next Generation Residential Gateway (RG) is capable of supporting the ever increasing need for higher data throughput rates, signaling range that covers the whole house and robustness capable of mitigating the sources of interference found in the home.
Tags : 
bandwidth, residential gateways, bandwidth management, home networking, wireless networking, consumer electronics, texas instruments, network architecture, remote access, remote network management, traffic management
    
Texas Instruments
Published By: LANDesk     Published Date: Feb 12, 2007
White paper discussing how the LANDesk® Management Gateway in LANDesk® management solutions 8.6, along with LANDesk® Trusted Access™, help organizations extend the enterprise management of remote devices across the Internet without having to "punch holes" in the firewall or compromise the security of such devices or the corporate infrastructure.
Tags : 
network security, remote access, security, mobile workers, mobile workforce, remote user, remote workers, trusted access, web service security, internet security, landesk
    
LANDesk
Published By: LANDesk     Published Date: Feb 12, 2007
This white paper discusses how the new LANDesk® Antivirus solution, available as an add-on to LANDesk® Management Suite and LANDesk® Security Suite, provides a competitively priced, front-line malware and malicious code defense for all network endpoints, including workstations, file servers, mail systems and Internet gateways.
Tags : 
network security, security, anti virus, virus, viruses, antivirus, anti-virus, malware, internet security, web security, endpoint security, end point security, end-point security, intrusion prevention, landesk
    
LANDesk
Published By: ColdSpark     Published Date: Feb 23, 2007
Though legacy open-source email network applications like sendmail and postfix are widely used, the escalating demands of today's enterprise environments have outpaced their capabilities. Large organizations must now look to implement a true enterprise mail transport platform to support the standards of their current and growing business. Learn how to modernize your email system now.
Tags : 
email, email infrastructure, sendmail, postfix, email server, email servers, email routing, email platform, email marketing, email automation, mta, mail transport, mail transport agent, email delivery, email archiving, email gateway, email backbone, email management, open source email, ironport
    
ColdSpark
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.