Virtual security appliance

Results: 198



#Item
61Meditab - CosmetiSuite Cloud Hosting 1. System requirements 1.1 Workstations Workstations  Workstations

Meditab - CosmetiSuite Cloud Hosting 1. System requirements 1.1 Workstations Workstations Workstations

Add to Reading List

Source URL: cosmetisuite.com

Language: English - Date: 2014-07-17 18:38:20
62HIABTM Small Business  HIABTM Small Business HIABTM Small Business is the most cost efficient solution available for small businesses to implement vulnerability management. It provides

HIABTM Small Business HIABTM Small Business HIABTM Small Business is the most cost efficient solution available for small businesses to implement vulnerability management. It provides

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2015-04-08 06:34:07
63A Disruptive Approach to Hybrid Clouds: Overlay Networks November 4, 2014  Dr. Jaushin Lee

A Disruptive Approach to Hybrid Clouds: Overlay Networks November 4, 2014 Dr. Jaushin Lee

Add to Reading List

Source URL: res.sys-con.com

Language: English - Date: 2014-11-13 14:59:39
64Netilla Security Platform ® SSL VPN Appliance  Meeting the Need of

Netilla Security Platform ® SSL VPN Appliance Meeting the Need of

Add to Reading List

Source URL: www.skssecurity.nl

Language: English - Date: 2004-05-21 17:10:40
65CASE STUDY  Referentia Builds Managed Security and Network Services in the Amazon EC2 Cloud with AccelOps

CASE STUDY Referentia Builds Managed Security and Network Services in the Amazon EC2 Cloud with AccelOps

Add to Reading List

Source URL: pages.accelops.com

Language: English - Date: 2015-04-03 13:08:30
66Check Point Datasheet  PRODUCT DESCRIPTION The Check Point Security Gateway Virtual Edition (VE) protects dynamic virtualized environments

Check Point Datasheet PRODUCT DESCRIPTION The Check Point Security Gateway Virtual Edition (VE) protects dynamic virtualized environments

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2014-09-08 11:01:43
67Virtualized Environments for the Harness High Performance Computing Workbench∗ B. K¨onning1,2 , C. Engelmann1,2 , S. L. Scott1 , and G. A. Geist1 1 Computer Science and Mathematics Division Oak Ridge National Laborato

Virtualized Environments for the Harness High Performance Computing Workbench∗ B. K¨onning1,2 , C. Engelmann1,2 , S. L. Scott1 , and G. A. Geist1 1 Computer Science and Mathematics Division Oak Ridge National Laborato

Add to Reading List

Source URL: www.csm.ornl.gov

Language: English - Date: 2009-07-03 20:22:56
68Securing Event Network Operations with the Cisco Adaptive Security Virtual Appliance Cisco IT Insights Protecting Network Operations at Cisco’s Largest Event The Cisco Live!™ U.S. conference is Cisco’s largest annu

Securing Event Network Operations with the Cisco Adaptive Security Virtual Appliance Cisco IT Insights Protecting Network Operations at Cisco’s Largest Event The Cisco Live!™ U.S. conference is Cisco’s largest annu

Add to Reading List

Source URL: www.cisco.com

Language: English
69CR100iNG  Future-ready Future-ready Security for SME networks

CR100iNG Future-ready Future-ready Security for SME networks

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:56
70Software distribution / Identity management / Software as a service / McAfee / Security Assertion Markup Language / Web portal / Provisioning / IBM cloud computing / Virtual appliance / Computing / Cloud computing / Centralized computing

Case Study Beverly Hills Wealth Management Customer profile Investment counseling and

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:46:37