compromise network

compromise network

[′käm·prə‚mīz ′net‚wərk]
(electricity)
Network employed in conjunction with a hybrid coil to balance a subscriber's loop; adjusted for an average loop length or an average subscriber's set, or both, to secure compromise (not precision) isolation between the two directional paths of the hybrid.
Hybrid balancing network which is designed to balance the average of the impedances that may be connected to the switchboard side of a hybrid arrangement of a repeater.
References in periodicals archive ?
Intent-driven networks are able to identify and proactively prevent security threats, ensuring that intelligence and automation never compromise network security.
The WatchGuard Firebox M400 and M500 appliances, based on the latest Intel Pentium and Intel Celeron Processors, are up to 61 percent faster than competing solutions with all layers of the company's award winning defence-in-depth solutions turned on , and up to 149 percent faster performing HTTPS inspection , ensuring enterprises never have to compromise network security for performance.
Using packet sniffing technology, a malicious intruder can capture sensitive data and compromise network security.
Founded by a number of long-time wireless industry veterans, VOTEL Mobile was born out of our belief that customers don't need to compromise network quality, service and handset selection by opting for a low-cost mobile phone plan," said Jeff Javidzad, chief executive officer, VOTEL Mobile.
Deploying inline tools to inspect and control network traffic can help block incoming threats, but inline tools can also complicate network operations while creating numerous potential points of failure which can significantly compromise network uptime and disrupt business continuity.
People are no doubt the soft-underbelly of any organisation, and through education and awareness we can try to limit their ability to compromise network security.
The WatchGuard Firebox M400 and M500 appliances are up to 61 percent faster than competing solutions with all layers of the company's award winning defense-in-depth solutions turned on , and up to 149 percent faster performing HTTPS inspection , ensuring enterprises never have to compromise network security for performance.
Who: The Tiger Team uses Boston-based Core Security Technologies penetration testing software CORE IMPACT to safely compromise network security and access sensitive information by taking advantage of vulnerabilities.
Lancope is the leading provider of network behavior analysis (NBA) and response solutions that defeat zero-day worms, internal network misuse and other anomalies that compromise network integrity.
In addition to enterprise market leadership, Lancope is also the leader in the higher education market as validated by many premier academic institutions,, including Dartmouth College, Stanford University School of Medicine, Northwestern University, and University of North Carolina, which have deployed Lancope's award-winning StealthWatch System to defeat zero-day worms, internal network misuse and other anomalies that compromise network integrity.
Lancope is the pioneer and market leader in network behavior analysis (NBA) and response solutions that defeat zero-day worms, internal network misuse and other anomalies that compromise network integrity.