Cyberoam

Results: 101



#Item
91Common Criteria / Security appliance / Thought / Evaluation / Cyberoam / Evaluation Assurance Level

Global Common Criteria Certification in Record Time BUSINESS CHALLENGE Cyberoam Technologies, a global provider of network security appliances based in India, wanted to expand its reach in the government marketplace and

Add to Reading List

Source URL: www.corsec.com

Language: English - Date: 2014-03-04 10:33:30
92Cyberoam / System software / Application firewall / Anti-spam techniques / SonicWALL / Rising Antivirus / Email spam / Spam / Phishing / Computing / Spamming / Internet

Fortigate Multi-Threat Security Systems – A Tough Competitor

Add to Reading List

Source URL: cyberoam.ir

Language: English - Date: 2010-04-01 02:10:32
93Computer network security / Cyberoam / Spam filtering / Spamming / Anti-spam techniques / Proxy server / Microsoft Forefront Threat Management Gateway / Spam / Spyware / Computing / Internet / System software

Cyberoam vs. ForeFront Threat Management Gateway 2010 Cyberoam Certifications Westcoast Labs Checkmark Certification: UTM Level 5 Categories: ƒ

Add to Reading List

Source URL: cyberoam.ir

Language: English - Date: 2010-08-11 23:46:58
94Cyberwarfare / Cyberoam / Security appliance / Fortinet / Application firewall / Unified threat management / Netasq / Check Point / ESoft / Computer network security / Computing / Computer security

Magic Quadrant for Unified Threat Management Gartner RAS Core Research Note G00205369, John Pescatore, Bob Walder, 22 October 2010, R3494[removed]Unified threat management devices provide all-in-one security in a single

Add to Reading List

Source URL: www.globalgate.com.ar

Language: English - Date: 2011-01-24 14:00:01
95Computer security / Unified threat management / Security appliance / Cyberwarfare / Anti-spam techniques / Network security / Firewall / Proxy server / Computer network security / Cyberoam / Computing

Microsoft Word - Cyberoam-vs-Astaro-Jan2009.doc

Add to Reading List

Source URL: cyberoam.ir

Language: English - Date: 2010-04-01 02:03:54
96Cyberoam

ATMECO Component Integrity Management System – CIMS High security ‘cloud computing’ comes to component integrity management

Add to Reading List

Source URL: www.atmeco.com

Language: English - Date: 2014-01-25 14:12:22
    97Electronic engineering / Cyberoam / Application firewall / Cloud computing / Firewall / Software as a service / Voice over IP / Unified threat management / Quality of service / Computing / Computer network security / Centralized computing

    Application Firewall[removed]...

    Add to Reading List

    Source URL: www.cyberoam.com

    Language: English - Date: 2011-10-17 09:31:07
    98Computing / Unified threat management / Cyberoam / Security appliance / Network security / Identity management / Information security / Network Access Control / Internet security / Computer network security / Computer security / Cyberwarfare

    Cyberoam Vendor Spotlight

    Add to Reading List

    Source URL: www.cyberoam.com

    Language: English - Date: 2011-10-17 09:03:18
    99Cybercrime / Computer network security / Malware / Phishing / Social engineering / Cyberoam / Anti-spam techniques / Spyware / Spam / Internet / Spamming / Computing

    Unified Threat Management White Paper

    Add to Reading List

    Source URL: www.cyberoam.com

    Language: English - Date: 2011-10-17 09:34:48
    100Antivirus software / Backup software / Computer security / Magic Quadrant / Norton AntiVirus / NetBackup / Gartner / Software AG / Cyberoam / Software / Symantec / Computing

    Corporate Fact Sheet AT A GLANCE

    Add to Reading List

    Source URL: www.symantec.com

    Language: English - Date: 2013-10-08 19:46:53
    UPDATE