Back to Results
First PageMeta Content
Computing / Deep content inspection / Network security / Application firewall / Distributed firewall / Check Point / Computer network security / Computer security / Cyberwarfare


Endpoint Based Policy Management: The Road Ahead Introduction In a rapidly growing and crowded security solutions market, organizations need to deploy the most effective technologies taking into consideration the legiti
Add to Reading List

Document Date: 2011-01-21 15:58:56


Open Document

File Size: 18,16 KB

Share Result on Facebook

City

Endpoint / /

Company

NetVeda LLC / /

IndustryTerm

Internet routing devices / corporate networks / policy management solutions / router devices / malicious applications / wireless laptops / multicast audio/video conferencing services / mid-stream devices / crowded security solutions / server-based centralized solutions / mission critical applications / differential services / legitimate network applications / Internet routers / real time / corporate network / discard algorithms / in enterprise networks / enterprise-wide network / carrier networks / server-based and mid-stream solutions / traffic management solutions / network-enabled applications / harmful network-aware applications / embedded firewall devices / on-line transactions / internal network / electronic commerce / security solutions / integrated routing devices / /

Technology

4 discard algorithms / broadband / Frame Relay / Internet routers / firewall / video conferencing / HTTP / MPLS / ATM / UDP / SSL / specific protocol / class of service / Gigabit Ethernet / /

SocialTag