Virtual firewall

Results: 306



#Item
131Network architecture / Firewall / Network switch / Load balancing / Distributed firewall / Virtual LAN / Deep packet inspection / Computer network security / Computing / Middlebox

A Policy-aware Switching Layer for Data Centers Dilip A. Joseph [removed] Arsalan Tavakoli [removed]

Add to Reading List

Source URL: ccr.sigcomm.org

Language: English - Date: 2008-07-23 12:32:55
132Computer networking / Check Point / Computer network security / Deep packet inspection / Hyper-V / Hypervisor / Virtual appliance / VMware / Virtual firewall / System software / Software / Virtual machines

Check Point Datasheet PRODUCT DESCRIPTION The Check Point Security Gateway Virtual Edition (VE) protects dynamic virtualized environments

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2014-09-08 11:01:43
133Internet protocols / Network protocols / Internet privacy / WAN optimization / Virtual private network / Wide area network / Traffic shaping / Stateful firewall / Management / Network performance / Computer network security / Computing

SANGFOR® WAN Optimization (WANO) LAN Speed on Your WAN

Add to Reading List

Source URL: www.sangfor.com

Language: English - Date: 2014-09-20 08:54:56
134Computer network security / Cyberwarfare / Virtual machines / Hypervisor / Hyper-V / Denial-of-service attack / Virtual LAN / Firewall / VM / System software / Software / Computing

datacenter_capabilities.dvi

Add to Reading List

Source URL: conferences.sigcomm.org

Language: English - Date: 2010-10-18 13:47:11
135Network tap / Information technology management / Computer architecture / Network switch / Load balancing / Virtual LAN / EtherChannel / Firewall / Computer network / Ethernet / Computing / Network management

VERSAstream 1224 TM 24 Port Any-to-Any Switch with Load Balancing and Packet Filtering Flexible, Any-to-Any Line-Rate Hardware Based Load

Add to Reading List

Source URL: www.datacomsystems.com

Language: English - Date: 2013-12-31 21:39:29
136Hypervisor / Virtualization / Hyper-V / Hardware virtualization / Virtual firewall / X86 virtualization / System software / Software / Virtual machines

Achieving Compliance in an Increasingly Virtual World Akash Chandrashekar & Dave Russell Solutions Architects, Red Hat Friday, June 25

Add to Reading List

Source URL: www.redhat.com

Language: English - Date: 2010-06-23 15:54:29
137Application firewall / Imperva / Cisco Systems / Virtual firewall / Network security / VMware / Cisco ASA / Computing / Computer network security / Computer security

Securing Virtual Applications with Cisco and Imperva Virtualization offers many benefits, but it also introduces a host of new security risks. Organizations wish to consolidate hardware, reduce power consumption, and str

Add to Reading List

Source URL: www.cisco.com

Language: English
138Tunneling protocols / Internet protocols / Internet / Virtual private networks / Layer 2 Tunneling Protocol / IPsec / Firewall / Computer network security / Computing / Network architecture

et he Datas WatchGuard®® XTM 1050 and 2050

Add to Reading List

Source URL: watchguard.com

Language: English - Date: 2013-01-11 15:18:08
139Network architecture / Cyberoam / Unified threat management / Security appliance / Application firewall / Stateful firewall / Virtual private network / IPsec / Proxy server / Computer network security / Computing / Internet

CR100iNG Future-ready Future-ready Security for SME networks

Add to Reading List

Source URL: www.cyberoam.com

Language: English - Date: 2015-02-05 05:42:56
140Hyper-V / Windows Server / Hypervisor / Proxy server / VM / Trusted Computing / Embedded hypervisor / Virtual firewall / System software / Software / Computer networking

“Trusted Passages”: Meeting Trust Needs of Distributed Applications Mustaque Ahamad, Greg Eisenhauer, Jiantao Kong, Wenke Lee, Bryan Payne and Karsten Schwan Georgia Tech Information Security Center & Center for Expe

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-09 17:34:04
UPDATE