Intrusion Patent DemandWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Intrusion Patent Demand returned the following results.
RSS What is RSS?
Related Categories

 •   Intrusion Prevention Solutions
 •   Network Security
 •   Security Monitoring
 •   Data Center Management
 •   Storage Management
 •   Intrusion Detection/ Forensics
 •   Anti-Virus Solutions
 •   Virtualization
 •   Storage Security
 •   Data Security

Related Searches
 •   Fast Intrusion Patent
 •   Form Intrusion
 •   General Intrusion
 •   Impacts Of Intrusion
 •   Intrusion Filing
 •   Intrusion Patent B2B
 •   Intrusion Patent Demand Audits
 •   Intrusion Patent Demand Diagram
 •   Tool Intrusion Patent
 •   Web Casts Intrusion
Advertisement

ALL RESULTS
1 - 25 of 478 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Next-Generation Firewall by SonicWALL

February 28, 2011 - (Free Research)
It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked. 
(WHITE PAPER) READ ABSTRACT |

Intelligent real-time protection and application control by SonicWALL

March 17, 2011 - (Free Research)
It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network. 
(WHITE PAPER) READ ABSTRACT |

SuperMassive E10000 Series Next-Generation Firewall by SonicWALL

February 28, 2011 - (Free Research)
The SonicWALL® SuperMassive™ E10000 Series is SonicWALL’s Next-Generation Firewall platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds. 
(WHITE PAPER) READ ABSTRACT |

Deliver Application-level Security at Data Center Performance Levels by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
The shift from network-layer attacks to dynamically changing application-layer threats has dramatically increased security needs. This paper examines appliances that can quickly evolve to guarantee performance yet maintain a high level of security. 
(WHITE PAPER) READ ABSTRACT |

IBM Real-time Compression Appliance STN6800 by IBM Real-time Compression

October 2010 - (Free Research)
IBM Real-time Compression provides online storage optimization through real-time data compression without performance degradation. IBM Real-time Compression helps slow the growth of storage, reducing the amount of storage to be managed, powered and cooled. Read this informative product overview to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

IBM Real-time Compression Appliance STN6500 by IBM Real-time Compression

October 2010 - (Free Research)
IBM Real-time Compression provides online storage optimization through real-time data compression without performance degradation. IBM Real-time Compression helps slow the growth of storage, reducing the amount of storage to be managed, powered and cooled. Read this product overview to learn more. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Real World Intrusion Prevention (IPS) for the Demands of a New Security Reality by TippingPoint

August 2009 - (Free Research)
This whitepaper addresses primary areas that organizations must consider when evaluating possible solutions for intrusion prevention. Topics include: key network security challenged facing enterprises today; criteria for an effective IPS solution; And insights gained from enterprises already deploying IPS solutions in the real world. 
(WHITE PAPER) READ ABSTRACT |

Fulfilling The Promise of Desktop Virtualization With GreenBytes' Patented Breakthrough Deduplication by GreenBytes

July 2013 - (Free Research)
This whitepaper will help you learn about a patented zero latency inline deduplication solution that has been designed to break down the barriers of desktop virtualization. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Force.com Multitenant Architecture: Understanding the Design of Salesforce.com's Internet Application Development Platform by Salesforce.com

March 2009 - (Free Research)
To meet the extreme demands of its large user population, Force.com's foundation is a metadatadriven software architecture that enables multitenant applications. This paper explains the patented technology that makes the Force.com platform fast, scalable, and secure for any type of application. 
(WHITE PAPER) READ ABSTRACT |

CW Europe – February Edition by ComputerWeekly.com

February 2013 - (Free Research)
Many analysts are predicting that tablets will outsell laptops, this year, and become the most popular type of portable computer device. In this issue of CW Europe we take a look at tablet security, through a range of case studies, highlighting the benefits and downfalls of mobile computing. 
(EZINE) READ ABSTRACT |

Protection on demand: information security that works for you - instead of putting you to work. by IBM

February 2009 - (Free Research)
Check out this white paper to learn more about the new approach to information security, protection on demand, which simplifies security and produces cost savings. 
(WHITE PAPER) READ ABSTRACT |

Dell Protects Cloud-based Desktop Services with On Demand Networking from Vyatta by Vyatta Inc.

February 2011 - (Free Research)
Well known for its PCs and servers, Dell, based in Round Rock, Texas, also offers cloud-based services to enterprises, providing them the technology they need, without the burdens of upfront costs and complex maintenance, through services that feature on-demand scalability. 
(CASE STUDY) READ ABSTRACT |

The Critical Role of Data Loss Prevention in Governance, Risk and Compliance by Mimecast

August 2009 - (Free Research)
Email has become a critical business tool, but it is also the easiest way for information to escape from the confines of a business. Learn why email Data Leak Prevention is critical to safeguard the information that is inside your network. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Securing Virtual Compute Infrastructure in the Cloud by SAVVIS

February 2011 - (Free Research)
Server virtualization is one of the hottest topics in IT today. Initially driven by the need to consolidate servers to achieve higher hardware utilization rates, boost operational efficiency, and reduce costs, enterprises have recently implemented virtualization to obtain on-demand access to additional compute resources. 
(WHITE PAPER) READ ABSTRACT |

DocuSign - Electronic Signature Services by DocuSign, Inc.

DocuSign is a secure and convenient way to get a legally binding electronic signature. It's fast and easy-to-use. For businesses, DocuSign can dramatically increase efficiency and accelerate growth while reducing administrative costs. 
(ASP)

Woods Gain Advanced Web Filtering Technology with Bloxx by Bloxx, Inc.

September 2008 - (Free Research)
The Bloxx Web filtering appliance with Tru-View Technology combines the best of traditional methods with its patented language analysis and intelligent identification techniques, providing three levels of protection. 
(WHITE PAPER) READ ABSTRACT |

Xiotech Emprise 5000 and Citrix XenServer 5.5.0 by Xiotech Corporation

June 2010 - (Free Research)
Xiotech's Emprise 5000 system is a revolutionary concept in data storage. It is built on patented Intelligent Storage Element (ISE) technology and provides a perfectly balanced building block of performance, reliability, and scalability that delivers the lowest total cost of ownership of any SAN or SAN-like storage system on the market. 
(WHITE PAPER) READ ABSTRACT |

ExaGrid: Cost-Effective Disk-Based Backup by ExaGrid Systems, Inc.

April 2011 - (Free Research)
The ExaGrid system is a plug-and-play disk backup appliance that works with existing backup applications. ExaGrid’s patented zone-level deduplication technology minimizes the amount of data to be stored by storing only the unique bytes across backups instead of storing the redundant data. Read on to learn more today! 
(DATA SHEET) READ ABSTRACT |

Dell Automated Deployment by Dell, Inc. and Microsoft Windows 7

August 2010 - (Free Research)
Dell Services has developed patent pending technology and processes that automates the PC provisioning process which can greatly reduce the overall cost associated with PC deployments. Read this data sheet to learn more! 
(DATA SHEET) READ ABSTRACT |

Inside the Dell Equallogic™ PS Series iSCSI Storage Arrays by Dell India

July 2008 - (Free Research)
Built on patented peer storage architecture, the Dell EqualLogic PS Series of Internet SCSI (iSCSI) storage arrays offer high performance, reliability, intelligent automation, and seamless virtualization of storage to enable simplified enterprise storage deployment and management, and comprehensive data protection. 
(BROCHURE) READ ABSTRACT |

IBM ProtecTIER Deduplication Solutions by IBM

May 2011 - (Free Research)
IBM ProtecTIER Deduplication solutions, featuring revolutionary and patented HyperFactor data deduplication technology, provide enterprise-class performance, scalability, and proven enterprise-level data integrity to meet the disk-based data protection needs of the enterprise data center down to mid-market environments. 
(MICROSITE) READ ABSTRACT |

HP Dynamic Deduplication - achieving a 50:1 ratio by Hewlett-Packard Company

March 2009 - (Free Research)
In 2008, HP introduced two products to the HP StorageWorks D2D Backup System Family. Both feature Dynamic deduplication based on an HP-patented algorithm that packs up to 50 times more backup data into the same disk footprint. This paper explains how Dynamic deduplication works and also establishes how a 50:1 deduplication ratio may be achieved. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

January 2011 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It by Google Apps

June 2010 - (Free Research)
Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 478 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts