compromise network

compromise network

[′käm·prə‚mīz ′net‚wərk]
(electricity)
Network employed in conjunction with a hybrid coil to balance a subscriber's loop; adjusted for an average loop length or an average subscriber's set, or both, to secure compromise (not precision) isolation between the two directional paths of the hybrid.
Hybrid balancing network which is designed to balance the average of the impedances that may be connected to the switchboard side of a hybrid arrangement of a repeater.
References in periodicals archive ?
The WatchGuard Firebox M400 and M500 appliances, based on the latest Intel Pentium and Intel Celeron Processors, are up to 61 percent faster than competing solutions with all layers of the company's award winning defence-in-depth solutions turned on , and up to 149 percent faster performing HTTPS inspection , ensuring enterprises never have to compromise network security for performance.
The WatchGuard Firebox M400 and M500 appliances are up to 61 percent faster than competing solutions with all layers of the company's award winning defense-in-depth solutions turned on , and up to 149 percent faster performing HTTPS inspection , ensuring enterprises never have to compromise network security for performance.
Using packet sniffing technology, a malicious intruder can capture sensitive data and compromise network security.
DeviceLock is designed to prevent data theft and network corruption by users who might download sensitive files to external media, inadvertently introduce viruses and other malicious programs through removable disks, or otherwise compromise network security through open devices and ports.
Founded by a number of long-time wireless industry veterans, VOTEL Mobile was born out of our belief that customers don't need to compromise network quality, service and handset selection by opting for a low-cost mobile phone plan," said Jeff Javidzad, chief executive officer, VOTEL Mobile.
People are no doubt the soft-underbelly of any organisation, and through education and awareness we can try to limit their ability to compromise network security.
It is increasingly important to provide centralized protection from spyware before it has a chance to harm corporate environments and compromise network security.
Who: The Tiger Team uses Boston-based Core Security Technologies penetration testing software CORE IMPACT to safely compromise network security and access sensitive information by taking advantage of vulnerabilities.
Lancope is the leading provider of network behavior analysis (NBA) and response solutions that defeat zero-day worms, internal network misuse and other anomalies that compromise network integrity.
In addition to enterprise market leadership, Lancope is also the leader in the higher education market as validated by many premier academic institutions,, including Dartmouth College, Stanford University School of Medicine, Northwestern University, and University of North Carolina, which have deployed Lancope's award-winning StealthWatch System to defeat zero-day worms, internal network misuse and other anomalies that compromise network integrity.
Lancope is the pioneer and market leader in network behavior analysis (NBA) and response solutions that defeat zero-day worms, internal network misuse and other anomalies that compromise network integrity.