Computer appliance

Results: 768



#Item
731System administration / Network management / Credit cards / Data privacy / System software / Payment Card Industry Data Security Standard / Event data / Log analysis / SolarWinds / Information technology management / Computing / Computer security

LOG & EVENT MANAGEMENT FOR security & compliance SolarWinds® Log & Event Manager (LEM) is a groundbreaking virtual appliance that combines real-time log analysis and event correlation to deliver the visibility, security

Add to Reading List

Source URL: easystreet.com

Language: English - Date: 2013-06-26 13:41:53
732Server / Computing / Technology / Computer architecture / Windows XP Media Center Edition / Windows XP editions / Windows XP / Server appliance / Dedicated hosting service

Application Software Deployment: MCE Server Appliance verse User Installed Software An MCE built server appliance is a custom built standalone, dedicated server (or in a clustered configuration) specifically designed to

Add to Reading List

Source URL: www.mce.com

Language: English - Date: 2012-12-20 06:35:32
733Cisco Systems / Electronics / Cisco PIX / Cisco ASA / Cisco Catalyst / Cisco Security Manager / Security appliance / Virtual firewall / Cisco Career Certifications / Server appliance / Computer network security / Computing

Solution Overview Cisco ASA Firewall

Add to Reading List

Source URL: mt.intnet.mu

Language: English - Date: 2013-04-08 23:44:29
734System software / Software / Cisco PIX / Server appliance / Cisco Systems / Cisco IOS / IOS / Vyatta / Cisco Career Certifications / Computing / Routers / Computer network security

Telconi Terminal for Cisco IOS® and PIX Data Sheet Telconi Terminal - A Productivity Application For Network Administrators

Add to Reading List

Source URL: www.telconi.com

Language: English - Date: 2005-08-29 07:26:11
735Security appliance / Server appliance / Computer network security

For Immediate Release Contact Information: Steve Sahl Cell: [removed]Fax: [removed]

Add to Reading List

Source URL: www.thebarriergroup.com

Language: English - Date: 2010-04-27 19:42:38
736Product management / Computer-aided design / Product lifecycle management / Software project management / Data warehouse appliance / Software product management / Business / Technology / Information technology management

Iron Systems OEM Solutions Product Life Cycle Management From Concept to Fulfillment, Iron manages your product portfolio so you can focus on revenue, development, and expanding your business. At Iron Systems, We focus

Add to Reading List

Source URL: www.ironsystems.com

Language: English - Date: 2014-05-13 06:36:38
737Electronics / Technology / Cisco Systems / Deep packet inspection / Videotelephony / Nortel / Cisco PIX / Router / Virtual private network / Computing / Computer network security / Server appliance

ROBERT TOOLE 50 Tuscarora Heights NW Calgary, Alberta, T3L-2H2

Add to Reading List

Source URL: www.tooleweb.ca

Language: English - Date: 2007-10-01 00:57:50
738Computing / Unified threat management / Cyberoam / Security appliance / Network security / Identity management / Information security / Network Access Control / Internet security / Computer network security / Computer security / Cyberwarfare

Cyberoam Vendor Spotlight

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2011-10-17 09:03:18
739Computing / Anti-spam / Proofpoint /  Inc. / Spam filtering / Server appliance / Computer network security / Computer security

» GROUP TEST l Web content management Web content management includes overseeing all data flows related to surfing the web. Peter Stephenson and the SC Lab team put 12 offerings through their paces.

Add to Reading List

Source URL: www.edgewave.com

Language: English - Date: 2011-03-02 12:35:36
740Spam filtering / Computer network security / Email / Messaging Security / Anti-spam techniques / Email spam / Spam / The Spamhaus Project / Security appliance / Computing / Spamming / Internet

Check Point Messaging Security FAQ Messaging Security Overview Q: What is “Messaging Security?”

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2008-08-15 16:43:08
UPDATE