Network Behavior Anomaly Detection Reports

Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You
sponsored by Aladdin Knowledge Systems
WHITE PAPER: This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.
Posted: 18 Mar 2008 | Published: 18 Mar 2008

Aladdin Knowledge Systems

Visibility Fabric Architecture
sponsored by Gigamon
WHITE PAPER: Review the driving forces affecting the network infrastructure, the shortcomings of legacy approaches to traffic visibility, and the growing need to implement a system that can provide visibility across the boundaries of both the physical and virtual.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Gigamon

Zurich Financial Services Runs Messaging & Collaboration as a Business with DYS CONTROL!™
sponsored by Permessa Corporation (formerly DYS Analytics, Inc.)
CASE STUDY: Usage-based cost-allocation has become increasingly popular for organizations looking to change their accounting methods for the way IT usage is charged. Learn about an effective and accurate solution to measure messaging usage.
Posted: 09 Apr 2007 | Published: 01 Apr 2007

Permessa Corporation (formerly DYS Analytics, Inc.)

Why, and how, to merge your SD-WAN and security strategies
sponsored by TechTarget Networking
EGUIDE: SD-WAN has been linked to security from its inception, but what if you could go one step further? What if there were ironclad ways to manage threats, trust, visibility and orchestration to give your organization an added layer of security through SD-WAN? In this handbook, read more about piecing together SD-WAN and security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

TechTarget Networking

Practitioners Guide to Establishing a SOC Webinar
sponsored by AT&T Cybersecurity
WEBCAST: This AlienVault Unified Security Management (USM) webinar is intended for a technical audience and will provide the core information necessary to evaluate the security controls essential to establishing an efficient Security Operation Center (SOC).
Posted: 16 Jul 2013 | Premiered: Jul 16, 2013

AT&T Cybersecurity

Gartner Magic Quadrant Report for Application Delivery Controllers
sponsored by Citrix
ANALYST REPORT: This Gartner Magic Quadrant report explores application delivery controllers (ADCs) and their role in the modern data center. View now to uncover a quick description of twelve of today's leading ADC vendors, their strengths and weaknesses, and where they stack up when compared.
Posted: 08 Aug 2013 | Published: 30 Oct 2012

Citrix

Exploring New Features, Uses for Secure Web Gateway Appliances
sponsored by TechTarget Security
EGUIDE: In this expert e-guide, discover how secure Web gateways (SWGs) are rapidly evolving to meet the new security needs of the enterprise. Uncover the factors driving the need for better security, key SWG features and benefits, deployment model trends, and more.
Posted: 08 Feb 2013 | Published: 08 Feb 2013

TechTarget Security

Yipit Case Study - Optimizing Cloud Infrastructure to Boost Performance
sponsored by AppFirst
CASE STUDY: This case study reveals the solution Yipit.com trusted to provide them the granular insight they needed to meet both monitoring and client needs. View now to uncover how this solution helps them troubleshoot performance issues before they affect their customers, improve system reliability, and more.
Posted: 03 Sep 2013 | Published: 03 Sep 2013

AppFirst

Simplify Network Monitoring with Ixia Anue NTO
sponsored by Ixia
VIDEO: Are you ready to make network monitoring simple and secure again? View this video to learn about a solution that can help you achieve just that.
Posted: 03 Sep 2013 | Premiered: 03 Sep 2013

Ixia

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security