Manufacturer Security Appliance CanadianWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Manufacturer Security Appliance Canadian returned the following results.
RSS What is RSS?
Related Categories

 •   Network Security
 •   Data Security
 •   Application Security
 •   Virtualization
 •   Storage Management
 •   Backup Systems and Services
 •   Data Center Management
 •   Firewalls
 •   Enterprise Data Protection and Privacy
 •   Network Management

Related Searches
 •   B2B Manufacturer Security Appliance
 •   Information Manufacturer Security
 •   Manufacturer Design
 •   Manufacturer Managing
 •   Manufacturer Patent
 •   Manufacturer Security Guide
 •   Parts Of Manufacturer Security
 •   Quality Manufacturer Security
 •   Unix Manufacturer
Advertisement

ALL RESULTS
1 - 25 of 469 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Mobile Security Report 2009 by McAfee, Inc.

December 07, 2009 - (Free Research)
Device manufacturers are balancing control with innovation, a dynamic that often controls the mobile ecosystem. This is why the McAfee Mobile Security Report 2009 is taking a closer look at manufacturers’ security experiences, their concerns and priorities, and their approach to major security challenges that lie ahead of them in the near future. 
(WHITE PAPER) READ ABSTRACT |

Canadian Airport Reaps the Benefits of Truly Unified Communications by Hewlett-Packard Company

June 2007 - (Free Research)
In this case study learn how Halifax International Airport Authority, one of Canada's largest airports, developed and integrated a unified communications solution that created flexibility and efficiency for how their terminal space is utili... 
(WHITE PAPER) READ ABSTRACT |

Food Manufacturer Extends Its Workforce with Secure Remote Access by Cisco Systems, Inc.

April 2008 - (Free Research)
This case study describes how one of the most well-known food producers and distributors achieved cost savings, increased productivity, and solved business challenges through deployment of the Cisco Adaptive Security Appliance (ASA) VPN Edition. 
(CASE STUDY) READ ABSTRACT |

Case Study: Helping AIC Cut Daily Backup Window While Saving Money & Staff Time by Quantum Corporation

April 2009 - (Free Research)
Read this customer case study to see how Canadian mutual fund company AIC Ltd. leveraged Quantum's DXi™5500 disk backup solution featuring data deduplication and replication technology in order to drastically reduce backup time as well as cut storage costs and management. 
(CASE STUDY) READ ABSTRACT |

Edmonton Catholic Schools: Catholic school district supports 21st century learning with HP Converged Infrastructure by HP & Intel®

December 2012 - (Free Research)
This brief case study introduces one Canadian school district that offers publicly funded Catholic education to over 34,600 students at 88 schools – deploying a compact, virtualized, high-performance server and storage infrastructure to provide increased capacity and maximum flexibility and to ensure redundancy. 
(CASE STUDY) READ ABSTRACT |

Cisco PIX 501 Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 501 Security Appliance delivers enterprise-class security for small office and teleworker environments, in a reliable, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

CISCO PIX 515E SECURITY APPLIANCE by Cisco Systems, Inc.

The Cisco® PIX® 515E Security Appliance delivers a wealth of advanced security and networking services for small-to-medium business and enterprise networks, in a modular, purpose-built appliance. 
(HARDWARE PRODUCT)

Messaging Security Goes Virtual: Improve Email Security and Lower Costs with Virtual Appliances by Proofpoint, Inc.

July 2008 - (Free Research)
Virtualization provides the ability to increase server and storage capacity without reinvesting in new hardware. That can translate into huge cost savings - not only in hardware costs, but in power, cooling, and management as well. Read on to learn how virtual appliances can deliver huge ROI. 
(WHITE PAPER) READ ABSTRACT |

TrendLabs: Global Threat Trends 1H 2010 by Trend Micro, Inc.

October 2010 - (Free Research)
In this report covering January to June 2010, we examine various cybercrime incidents, the criminal’s use of multiple tools such as botnets, and look at threat trends and activity currently causing, and likely to continue to cause the most pain, cost and disruption to connected users across the world. 
(WHITE PAPER) READ ABSTRACT |

Leading Insurance, Financial and Banking Services Provider Replaces Citrix with Ericom's Server Based Computing Solution by Ericom Software

May 2008 - (Free Research)
Western Financial group was facing a challenge to provide insurance brokers with remote access from the organization's core insurance application running on Windows terminal Servers, so to overcome this issue they moved on to Ericom. 
(WHITE PAPER) READ ABSTRACT |

Next-gen Load Balancing: Delivering Advanced Web Apps by Citrix

September 2008 - (Free Research)
The increasing demands for high availability, reliability and security of application access are driving the need for load balancers to provide a comprehensive set of network level and application-level services. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Railroad Carrier Virtualizes SAP on Converged Infrastructure by VCE (E-mail this company)

December 2013 - (Free Research)
In order to realize cost savings and operation efficiencies, rail carrier Canadian Pacific (CP) wanted to move from inefficient outsourced IT services to a private cloud implementation. This brief case study illustrates how CP leveraged a converged infrastructure to virtualize its extensive suite of SAP and other business-critical applications. 
(CASE STUDY) READ ABSTRACT |

ICBC Builds Cutting-edge Contact Center as Part of their Customer-Centric Strategy by Genesys

December 2012 - (Free Research)
This case study reveals how Canadian insurer ICBC built a flexible, cutting-edge contact center as a key part of its customer-centric strategy, enabling the company to improve routing flexibility, increase customer satisfaction, and more. 
(CASE STUDY) READ ABSTRACT |

Unified Storage: Capacity Optimization Features andVirtualization Capabilities by IBM

October 2013 - (Free Research)
View this short video to learn how the largest Canadian-based provider of human resources consulting and outsourcing services upgraded and modernized its storage infrastructure using virtualized software defined storage systems designed to consolidate workloads into a single storage system for simplicity of management. 
(WEBCAST) READ ABSTRACT |

Alpha Exchange Improve Performance, Reduces Cost by Migrating to Red Hat Enteprise Linux by Red Hat and HP

April 2013 - (Free Research)
This informative case study describes how a leading Canadian financial group was able to increase performance and reduce costs by migrating to a Linux environment. 
(WHITE PAPER) READ ABSTRACT |

Case Study: London Life Insurance by Pitney Bowes Business Insight

July 2010 - (Free Research)
London Life Insurance needed to move quickly after it acquired Prudential Insurance’s entire Canadian business operations. London Life wanted to welcome its new client base and maintain its reputation for providing superb customer service. Read on to learn how a new document composition solution allowed for keeping pace with its expanding business. 
(CASE STUDY) READ ABSTRACT |

Unified Threat Management: The security you need, the simplicity you want by Check Point Software Technologies Ltd.

September 2008 - (Free Research)
This paper explores the security issues driving the emergence of UTM products. It then examines a new solution from Check Point, UTM-1 Total Security appliances, and shows how it tackles many of the security challenges other UTM products cannot. 
(WHITE PAPER) READ ABSTRACT |

Security Virtualization: Re-architecting the Appliance Mentality by Crossbeam Systems

November 2008 - (Free Research)
In order to determine what "security virtualization" really means, it is useful to understand how companies define and enforce their security and accompanying compliance policies today. 
(WHITE PAPER) READ ABSTRACT |

SSL VPN for Secure Wireless LAN Access by F5 Networks

October 2007 - (Free Research)
For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell... 
(WHITE PAPER) READ ABSTRACT |

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions by SonicWALL

April 2008 - (Free Research)
Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

All-in-One Internet Filtering Solution Solves Costly Problems for Easton Bell Sports by Bloxx, Inc.

September 2008 - (Free Research)
Easton-Bell Sports was growing increasingly concerned about its bandwidth consumption, as well as the time IT staff members were spending removing malware from employees' computers. 
(CASE STUDY) READ ABSTRACT |

Niksun NetDetector Data Sheet by NIKSUN

NetDetector seamlessly integrates with other NIKSUN products, 3rd-party applications and network devices to provide a rock-solid security solution. 
(HARDWARE PRODUCT)

Vyatta Community Edition 4 - Open-Source Routing and Security by Vyatta Inc.

September 2008 - (Free Research)
Vyatta delivers complete, ready-to-deploy, open-source networking solutions that make it possible for anyone to own an enterprise-class router/firewall/VPN for a fraction of the cost of traditional closed-source, proprietary products. 
(TRIAL SOFTWARE) READ ABSTRACT |

1 - 25 of 469 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts