tunnels

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name
Published By: ZScaler     Published Date: Nov 18, 2011
Read this informative whitepaper to learn how, as a Blue Coat customer, you can reap the benefits of Zscaler's comprehensive cloud security solution. Learn how enterprises with legacy proxy appliances-such as Blue Coat ProxySG-will further enhance their security with our unmatched advanced threat protection.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft
    
ZScaler
Published By: ZScaler     Published Date: Nov 21, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft
    
ZScaler
Published By: Sierra Wireless     Published Date: Jun 19, 2019
In addition to e-books, on-demand video and GPS devices, one of the future technological innovations envisioned by AT&T in its famous early 1990s series of “You Will” commercials was an Electronic Toll Collection (ETC) system that enabled drivers to wirelessly pay their tolls as they drove through a toll booth. While that prediction was perhaps not as bold as the others (Europe began developing similar ETC systems in the 1980s), today we take for granted E-ZPass in the U.S. and similar systems where drivers can enter toll roads, HOV lanes, bridges and tunnels without having to stop at a tollbooth to pay. Typically, these systems require a driver to put an OBU (On Board Unit, which can be called transponder or “edge” IoT device) in their vehicle and, when their vehicle passes through a toll booth, the toll booth wirelessly connects to the edge to automatically deduct the toll from their bank account.
Tags : 
    
Sierra Wireless
Published By: IBM     Published Date: Jul 15, 2015
This paper evaluates the market’s readiness for Zero Trust concepts and technologies, based on Forrester’s own market data and a custom study of the same audience.
Tags : 
intrusion prevention system, encrypted tunnels, it security, security management, network analysis, visibility capabilities
    
IBM
Published By: Astaro     Published Date: Aug 10, 2009
Hannoush Jewelers Inc., a jewelry manufacturer and retailer, was using frame relay, a private network, but decided to cut costs by moving to VPN tunnels to connect their many stores and offices.
Tags : 
hannoush, jewelery, private network, frame relay, vpn, tunnels, hackers viruses, spam, anti malware, astaro, internet security, content filtering, malware, security, cisco, sonicwall
    
Astaro
Published By: ZScaler     Published Date: Dec 13, 2011
Leveraging a combined view of billions of daily web transactions-spanning millions of enterprise users across over 140 countries - Zscaler ThreatLabZ delivers the State of the Web Q3 2011 Report.
Tags : 
blue coat, proxy sg, url filtering, web 2.0, cloud security, proxy av, xss, vpn, email gateway, web gateway, mobile device, saas, gre tunnels, proxy chaining, active directory, dlp, cookie theft
    
ZScaler
Search Resource Library