Foundry Networks this week combined its application switching and Web acceleration products in a single package. The package combines the ServerIronXL Layer 4-7 application switch with the ...
Most tech leaders, especially CTOs and Web site teams, are very familiar with using Secure Sockets Layer (SSL) to safeguard Web transactions. For quite some time, you've likely been using SSL ...
The NetScaler Request Switch 9400 (starting at $19,999) enables enterprises and content providers to meet the security and performance demands of today's enterprise Web applications. Within this ...
Layer 4 and Secure Sockets Layer encryption boxes on tap from Avaya next week could be useful in balancing loads among Web servers or firewalls and speeding up encrypted Web traffic. The company’s new ...
SUNNYVALE, Calif. — A networking and security products group that has been quietly working at Sun Microsystems Inc. for the past year launched its first product at the RSA Conference in San Jose, ...
With a nod toward increasing network infrastructure flexibility, Foundry Networks on Thursday introduced two 10 Gigabit Ethernet switches aimed at speeding up application traffic, along with a new set ...
How secure is the Internet? That single question has been the bane of the networking industry. With credit card transactions flowing fast and furious across the net, workforces becoming more remote, ...
The Secure Sockets Layer protocol is the de facto means for transmitting data over the Internet privately and securely. The protocol is integrated into every browser and every Web server, allowing any ...
NEW YORK, NY--(Marketwired - Oct 2, 2013) - KEMP Technologies today announced the availability of the LoadMaster 2400, the newest addition to KEMP's hardware load balancer portfolio. As more web-based ...
Blue Coat Systems’ SG line of WAN accelerators builds on traditional WAN optimization methods by adding a couple of their own, including support for SSL encrypted traffic and streaming media. Based on ...
The slew of news around acceleration, security and optimization technologies in 2006 could make any enterprise network manager’s head spin. How do you incorporate all the tools you need to deliver ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results