Hardware Crypto Accelerators White Papers

(View All Report Types)
Companies Boost Home/Mobile Remote Access Performance, Scalability and Security with Cato
sponsored by Cato Networks
WHITE PAPER: The COVID-19 pandemic led to the largest global work-at-home experiment in history. Unfortunately, home users often wrestle with the slow performance, latency and unreliability that come with backhauling remote connections to a data center. In this white paper, learn how 3 organizations were able to overcome these challenges with the help of Cato.
Posted: 09 Apr 2021 | Published: 09 Apr 2021

Cato Networks

Extreme Networks Physical Security Solution
sponsored by Extreme Networks
WHITE PAPER: This guide explores some significant benefits of networking for your physical security and how it can enhance your network performance.
Posted: 19 Feb 2014 | Published: 19 Feb 2014

Extreme Networks

IBM Collaboration Software for the Apple iPhone and iPad Devices
sponsored by IBM
WHITE PAPER: Collaboration is necessary in today’s workforce. To ensure compatibility, IBM has created a collaboration software for Apple devices – collaboration to go. Now workers really do have the ability to work where they want, when they want, using their Apple iPhone or iPad.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

IBM

The Future of Web Security: 10 Things Every Web Application Firewall Should Provide
sponsored by Imperva
WHITE PAPER: This guide takes a look at 10 things that every web application firewall should provide.
Posted: 19 Feb 2014 | Published: 31 Dec 2012

Imperva

Navigating Today's DDoS Landscape
sponsored by Ixia
WHITE PAPER: Learn more about distributed denial-of-service attacks, evolving security and mitigation solutions, and discover new best practices for preventing and responding to advanced attacks.
Posted: 02 May 2014 | Published: 02 May 2014

Ixia

Gunner Peterson's Security Gateway Buyer’s Guide
sponsored by Intel
WHITE PAPER: Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.
Posted: 25 Mar 2011 | Published: 25 Mar 2011

Intel

Operation "Ke3chang": Targeted Attacks Against Ministries of Foreign Affairs
sponsored by FireEye
WHITE PAPER: This guide explores a specific cyber-espionage campaign, how it used advanced persistent threats to infiltrate systems and what you can do to prevent similar attacks.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

The Fight for Full Network Visibility in a Dangerous World
sponsored by APCON, Inc.
WHITE PAPER: This white paper highlights critical features your network security strategies may be missing that are mandatory in today's advanced threat environment.
Posted: 09 May 2014 | Published: 09 May 2014

APCON, Inc.

Citizens National Bank of Texas Increases Advanced Cyber Attack Protection with FireEye
sponsored by FireEye
WHITE PAPER: With cyber-attacks growing in regularity and complexity, many businesses have to go the extra mile to protect their sensitive data. This case study takes a look at one company's success when implementing a Web-based malware protection system.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

FireEye

Cisco Smart Business Architecture
sponsored by Cisco
WHITE PAPER: This white paper covers a network architecture solution that can allow you to expand while also maintaining effective security.
Posted: 09 Jan 2014 | Published: 07 Feb 2013

Cisco