Perimeter security

Results: 202



#Item
71Military science / FMCW / Active Electronically Scanned Array / Moving target indication / Doppler radar / Man portable radar / Perimeter surveillance radar / Radar / Technology / Wireless

Aquila Cameras by Liteye Systems www.Liteye.com Coastal and Harbour Security White Paper

Add to Reading List

Source URL: www.liteye.com

Language: English - Date: 2015-04-05 08:59:04
72Computer security / Cybercrime / FireEye /  Inc. / Multi-agent systems / OpenDNS / Botnet / Phishing / Malware / Network security / Computing / Computer network security / Spamming

FireEye Fuel Technology Alliances FireEye and OpenDNS Extend FireEye’s threat protection capabilities beyond the network perimeter

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 18:21:42
73Computer security / Cybercrime / FireEye /  Inc. / Multi-agent systems / OpenDNS / Botnet / Phishing / Malware / Network security / Computing / Computer network security / Spamming

FireEye Fuel Technology Alliances FireEye and OpenDNS Extend FireEye’s threat protection capabilities beyond the network perimeter

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 15:22:28
74Public safety / Management / Core Security Technologies / Perimeter E-Security / Security / Chief technology officer / Information security

Black Hat usaR Demographics Snapshot Attendees come to Black Hat to meet leading IT vendors and to make

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:13
75Computing / OpenFlow / Malware / Packet capture / Threat / Firewall / Computer security / Computer network security / Cyberwarfare / Security

Stop Infections Inside the Network Perimeter FireSphere Threat Isolator, powered by the HP VAN SDN Controller Empowers global visibility and security with dynamic device isolation, internal packet capture and granular tr

Add to Reading List

Source URL: www.iboss.com

Language: English - Date: 2015-04-20 16:16:24
76Software / Multi-agent systems / Computer network security / Internet Information Services / Network management / System administration / Dynamic Host Configuration Protocol / SQL Slammer / Simple Network Management Protocol / Computing / System software / Internet standards

Cyber terrorism/warfare A packet can’t fly a plane… Typical types of attack: –Denial of service –Breeching the perimeter

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:21
77Software / Multi-agent systems / Computer network security / Internet Information Services / Network management / System administration / Dynamic Host Configuration Protocol / SQL Slammer / Simple Network Management Protocol / Computing / System software / Internet standards

Cyber terrorism/warfare A packet can’t fly a plane… Typical types of attack: –Denial of service –Breeching the perimeter

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
78Computing / Automation / Building automation / Industrial Ethernet / Modbus / File Transfer Protocol / Multilevel security / SCADA / Secure Shell / Technology / Security / Access control

Owl Enterprise Perimeter Defense Solution (EPDS) Owl Enterprise Perimeter Defense Solution The Owl Electronic Perimeter Defense Solution (EPDS) maintains process control network isolation while enabling critical informa

Add to Reading List

Source URL: www.owlcti.com

Language: English - Date: 2014-11-04 10:12:06
79Computing / Security / Database security / Database activity monitoring / Database / Computer security / Cyberwarfare / Host Based Security System / McAfee VirusScan / McAfee / Computer network security / Companies listed on the New York Stock Exchange

Data Sheet McAfee Database Activity Monitoring Cost-effective database protection to meet your compliance requirements Organizations store their most valuable and sensitive data in a database, but perimeter

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-04-15 15:26:20
80Computing / OpenFlow / Malware / Packet capture / Threat / Firewall / Computer security / Computer network security / Cyberwarfare / Security

Stop Infections Inside the Network Perimeter FireSphere Threat Isolator, powered by the HP VAN SDN Controller Empowers global visibility and security with dynamic device isolation, internal packet capture and granular tr

Add to Reading List

Source URL: residential.iphantom.com

Language: English - Date: 2015-03-19 19:17:57
UPDATE