integrated security platform

Results 1 - 14 of 14Sort Results By: Published Date | Title | Company Name
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
This white paper describes common DoS techniques, explains the technology integrated into every FortiGate consolidated security platform that helps in blocking DoS attacks, and offers suggestions on how to prevent an organization's network from being used to attack another organization.
Tags : 
fortinet, fortigate dos protection, malicious traffic, denial of service, ddos protection, network security, fortios, attacks
    
Fortinet, Inc.
Published By: Gigamon     Published Date: Oct 19, 2017
Read the IDG Tech Dossier, A Security Delivery Platform Benefits the Entire Organization to learn how a comprehensive, well-integrated security platform provides the foundation for the next generation of cybersecurity. By uniting a variety of security solutions and appliances for efficient operation through network visibility and security workflow orchestration, organizations benefit from continuous and pervasive network visibility, fault tolerance and scaling and optimal CPU utilization – thereby improving security and reducing cost. Download now!
Tags : 
    
Gigamon
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Kaspersky     Published Date: Feb 05, 2015
This Kaspersky guide shows the benefits that only and Integrated Platform Security Solution can bring.
Tags : 
integrated platform security, security solution, integrated security technologies, endpoint protection platforms, epps, application security, encryption, internet security
    
Kaspersky
Published By: McAfee EMEA     Published Date: Nov 15, 2017
To ensure fast, efficient, and comprehensive remediation of breaches, IT security decision makers have acknowledged the need to reduce the complexity of their endpoint security environments. Today’s enterprises value integrated endpoint security solutions that can effectively handle the whole process of endpoint security, including attack prevention, detection, and remediation. Single-vendor suite solutions and cloud technologies are on the rise due to their perceived benefits, including simplicity, lower costs, and better integrated coverage across platforms.
Tags : 
endpoint, efficiency, security, prevention, technology, decision makers
    
McAfee EMEA
Published By: McAfee EMEA     Published Date: Mar 14, 2018
By building an adaptable security infrastructure based on the McAfee® integrated security platform, this small information security team dramatically improved its ability to defend its organization, staff, and patients, despite an environment of continual change.
Tags : 
    
McAfee EMEA
Published By: Oracle     Published Date: Oct 27, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform
    
Oracle
Published By: Oracle     Published Date: Nov 05, 2015
This paper reveals why Oracle Cloud Platform provides all the benefits of cloud with complete, integrated, secure solutions at every layer of the technology stack.
Tags : 
cloud computing, cloud, cloud platform, enterprise cloud platform, benefits of cloud, integrated solutions, security solutions, oracle cloud platform
    
Oracle
Published By: SafeNet     Published Date: Jul 13, 2010
The information presented in this white paper discusses various approaches to cryptography and key management, and can be used as a starting point for developing an effective policy-based key management solution.
Tags : 
safenet, key management, cryptography, integrated security platform, policy compliance, data protection, enterprise security policy, lifecycle
    
SafeNet
Published By: SafeNet     Published Date: Jul 13, 2010
This white paper is the second in a series following An Enterprise Guide to Understanding Key Management which introduces different types of cryptography and keys used in modern data protection applications.
Tags : 
safenet, enterprise security policy, key management, cryptography, data protection application, integrated security platform, encryption, application security
    
SafeNet
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.