Application firewall

Results: 701



#Item
221System software / Riverbed Technology / Software architecture / Information technology management / Application firewall / Cloud computing / Infrastructure optimization / Load balancing / Application server / Computing / WAN optimization / Network performance

Riverbed Stingray Traffic Manager Brochure: Riverbed Stingray Traffic Manager Overview Online applications are expected to deliver consistently

Add to Reading List

Source URL: www.datum.com.sg

Language: English - Date: 2011-11-30 03:43:26
222Application firewall / Network performance / Software as a service / Malware / Firewall / Cloud computing / Application security / World Wide Web / Reverse proxy / Computing / Computer security / Computer network security

Press release Boulogne-Billancourt, July 6, 2012 Leading Analyst Firm report on WAF market highlights trends that play to DenyAll’s competitive advantage A Competitive Landscape published on June 29, 2012, highlights s

Add to Reading List

Source URL: www.denyall.com

Language: English - Date: 2015-02-25 04:56:16
223Cyberwarfare / Security / Denial-of-service attack / Radware / Application firewall / Network security / Application security / Botnet / Intrusion prevention system / Computer network security / Computer security / Computing

DefensePro Data Sheet DefensePro: DDoS Protection and Attack Mitigation Protect the Data Center and Network Against Emerging Network Threats In today’s info-security threat landscape, denial of service and distributed

Add to Reading List

Source URL: www.radware.com

Language: English - Date: 2015-04-14 15:45:14
224Security / Application firewall / Computer security / Akamai Technologies / Firewall / Denial-of-service attack / Computer network security / Computing / Cyberwarfare

AKAMAI CLOUD SECURITY SOLUTIONS: PRODUCT BRIEF Kona Web Application Firewall Application- layer defense to protect against attacks like SQL injections and cross-site scripts Everyone connected to the enterprise – wor

Add to Reading List

Source URL: www.akamai.de

Language: English - Date: 2014-07-29 16:36:01
225Internet standards / Internet / Computer security / Security / Transport Layer Security / Moxie Marlinspike / Man-in-the-middle attack / Application firewall / SSL acceleration / Computing / Cryptographic protocols / Secure communication

Ivan Ristic - How to Render SSL Useless

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:27
226System software / Computer network security / Application firewall / ModSecurity / Firewall / Apache HTTP Server / World Wide Web / Evasion / Hostname / Software / Computing / Computer security

Protocol-Level Evasion of Web Application Firewalls

Add to Reading List

Source URL: community.qualys.com

Language: English - Date: 2015-02-09 23:07:14
227Akamai Technologies / Content delivery network / Performance management / System administration / Software as a service / Business transaction management / IBM cloud computing / Application firewall / Cloud computing / Computing / Centralized computing

PRODUCT BRIEF Cloud Monitor A Cloud-based API solution that puts critical transaction and security event data at your fingertips As you migrate an increasing number of applications and services to the Cloud, more of you

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2013-10-01 04:06:01
228Computer security / Computer network security / Secure64 Software / Server appliance / Itanium / Malware / Server / Application firewall / Operating system / Computer architecture / System software / Computing

BREAKTHROUGH SECURITY FOR INTERNET-CONNECTED BUSINESSES FUNDAMENTAL ADVANCES FOR ITANIUM ® 2-BASED SERVERS DELIVER EXCEPTIONAL SECURITY AND PERFORMANCE FOR SERVER AND NETWORK APPLICATIONS

Add to Reading List

Source URL: www.secure64.com

Language: English - Date: 2009-10-09 13:10:16
229Computer network security / Computing / Application security / Application firewall / Penetration test / Web application security / Vulnerability / Cross-site scripting / SQL injection / Computer security / Cyberwarfare / Software testing

Source Code Analysis Made Easy The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:13:21
230Application firewall / Imperva / Cisco Systems / Virtual firewall / Network security / VMware / Cisco ASA / Computing / Computer network security / Computer security

Securing Virtual Applications with Cisco and Imperva Virtualization offers many benefits, but it also introduces a host of new security risks. Organizations wish to consolidate hardware, reduce power consumption, and str

Add to Reading List

Source URL: www.cisco.com

Language: English
UPDATE