TITLE

Network Security Hardware 3Com

AUTHOR(S)
McLaughlin, Kevin
PUB. DATE
March 2007
SOURCE
CRN;3/12/2007, Issue 1232, p48
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the top five network security hardware providers in "CRN" periodical's Channel Best-Sellers, a list of the top IT solution providers in 2006. Cisco Systems Inc. was the number one provider, with a market share of 33.3%. SonicWall Inc. was ranked number two with a market share of 18.4%. Other companies in the list are Netscreen Technologies Inc., WatchGuard Technologies Inc. and 3Com Corp.
ACCESSION #
24413356

 

Related Articles

  • Network Security Hardware. Poeter, Damon // CRN;3/31/2008, Issue 1262, p34 

    The article provides an overview of the market performance of companies offering network security hardware products. Cisco Systems Inc. posted a 35 percent share of the distribution market for the second half of 2007. Companies that registered a decline of less than 1 percent in share are Cisco,...

  • NetScreen, WatchGuard resize appliances. Greene, Tim // Network World;2/2/2004, Vol. 21 Issue 5, p12 

    Reports that NetScreen Technologies Inc. and WatchGuard Technologies Inc. will venture into the midsize business sector to sell their multifunction security appliances in 2004. Aim of giving companies the option to buy one hardware platform and then upgrade it as necessary; Security features...

  • NETWORK SECURITY PRODUCTS. Villano, Matt // CRN;4/25/2005, Issue 1143, p32 

    The article reports that Cisco Systems Inc. has been awarded first place in the network security products category in the CRN 2005 Channel Champions survey. Few would dispute Cisco Systems is a force to be reckoned with in networking, but that reputation is increasingly extending to security....

  • All-in-one security appliances. Garcia, Andrew; Sturdevant, Cameron // eWeek;12/15/2003, Vol. 20 Issue 50, p43 

    Implementing an integrated appliance will drastically ease ongoing security management and reduce network complexity, yet add a possible bottleneck for performance and availability. To date, IT administrators have been forced to deploy separate systems for anti-virus scanning, Web and...

  • In a crossover world, performance and security converge to give fast, secure apps. Broadhead, Steve // Computer Weekly;11/30/2004, p46 

    The article reports on mainstream applications increasingly adding top-end security features. I security companies and by the likes of Cisco Inc., 3Com Corp. and many others from the general networking world. But now, what have been considered as specialist security devices, such as intrusion...

  • 3Com 6000 could make it easier to build best-of-breed networks. Savvas, Antony // Computer Weekly;9/28/2004, p42 

    The article reports that 3Com Corp. has launched a range of routers that can integrate with users' existing Cisco Systems Inc. kit. The command line interfaces of the 3Com routers are similar to those on Cisco products, meaning that potential users will not have too many problems managing the...

  • FUD factor sells security upgrades.  // Communications News;Jan2005, Vol. 42 Issue 1, p6 

    This article deals with the findings of a survey conducted by WatchGuard Technologies regarding the adoption of fear, uncertainty and denial (FUD) factor by organizations in presenting worst-case scenarios. Almost half of respondents advocate the FUD factor, with many presenting worst-case...

  • Techie Training for Students. Sands, Clinton // Technology & Learning;Oct2003, Vol. 24 Issue 3, p36 

    Focuses on some information technology academies developed by large technology companies. Features of 3Com NetPrep; Overview of the Cisco Networking Academy; Student training at Microsoft IT Academy; Information on the Oracle Internet Academy.

  • NetScreen to add application layer security to gear. Greene, Tim // Network World;9/1/2003, Vol. 20 Issue 35, p6 

    Reports on the plans of computer applications company NetScreen Technologies to improve its security products. Incorporation of inspection ability to examine packets at the application level; Advantages of application layer security; Plans in improving management platform.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics