ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Appliances Research

  • Next-Generation Firewall 3301 Appliance v6.1.2 Vendor Scorecard

    Sponsored by: Forcepoint

    In this in-depth research report, gain insight into the actual performance of the new next-generation firewall; 3301 Appliance 6.1.2.

  • How the Basics of Network Security Have Evolved

    Sponsored by: Fortinet, Inc.

    In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

  • Digital Transformation and Network Security

    Sponsored by: Forcepoint

    In this ESG white paper, learn how digital transformation is changing the security landscape, and how pros are adapting to meet these new challenges.

  • Testing NGFW: Three Points of Value Critical to your Enterprise

    Sponsored by: Forcepoint

    In this webcast learn about a next generation firewall (NGFW) offering that can give you the ability to scale to over 2,000 devices form a single console, multi-link business continuity for transparent failover, and more.

  • Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF

    Sponsored by: F5 Networks

    More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.

  • End Web Application Security Risks with WAF

    Sponsored by: F5 Networks

    In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.

  • The 2017 State of the Firewall

    Sponsored by: FireMon

    Access FireMon's 3rd Annual State of the Firewall Report to learn how your peers feel about firewall infrastructure and management challenges, as well as the adoption and impact of emerging tech such as SDN, cloud, and IoT.

  • Demystifying The Threat Landscape: 10 Ways Network Security Pros Can Step Up Game

    Sponsored by: F5 Networks

    In this eBook, you'll learn more about the changing network security landscape, where your business is most vulnerable today, and 10 areas you can step up your security game.

  • Automation Isn't One-Size-Fits-All

    Sponsored by: FireMon

    In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.

  • Why Firewalls Alone Are No Longer Enough

    Sponsored by: VMware

    What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.

  • Putting a Next-Generation Firewall Through Its Paces

    Sponsored by: Forcepoint

    See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability, and total cost of ownership.

  • Automate Zero Trust Policy and Enforcement

    Sponsored by: FireMon

    In October 2016, Forrester Consulting evaluated enterprise firewall management and configuration auditing approaches. Discover Forrester's findings in this resource that highlight the importance of implementing firewall management and configuration auditing solutions sooner rather than later.

  • Firewall Clean Up Recommendations

    Sponsored by: FireMon

    At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.

  • NSS Labs NGFW Test Report

    Sponsored by: Forcepoint

    In this lab report from NSS Labs, discover how a Next-Generation Firewall measures up to its boasts on the market. Learn what's important to NGFWs, how they come up short, how they surpass expectations, and everything in-between.

  • Cyberthreat Defense Report

    Sponsored by: LogRhythm, Inc.

    This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.

  • Do You Need a VPN, Firewall or Both?

    Sponsored by: Global Knowledge

    In this Global Knowledge white paper, discover when VPNs and firewalls are most effective, suggestions for deployment, when a unified threat management system is worth considering, and hardware vs. software concerns.

  • Plan Your Firewall Migration to Increase Security Resilience

    Sponsored by: Ixia

    This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.

  • IT Needs to Change its Mindset Around Mobile Data Access

    Sponsored by: Hewlett Packard - Intel Xeon

    To successfully support enterprise mobility, IT admins need to change the way they think about mobile data access, security, and more. This e-guide details four things to keep in mind as your enterprise embraces this mobile world.

  • Open Sandwich Architecture Provides Scalable Performance and High Availability for Next-Generation Firewalls

    Sponsored by: Array Networks

    As network speeds and network security requirements continue to evolve, meeting your next-generation firewall's (NGFW) requirements by scaling up hardware capabilities becomes more difficult. Read this white paper to discover how employing application delivery controllers can help you meet your NGFW's requirements without scaling hardware.

  • New AWS Migration Tools Target Big Data Behind a Firewall

    Sponsored by: New Relic

    Amazon Web Services (AWS) recently added a multitude of capabilities to its public cloud that greatly reduce the data migration problem and decrease the fear of data breaches. This expert e-guide highlights all the new features of AWS that could soon be positively impacting your business.

  • Whiteboard: Barracuda Web Application Firewall

    Sponsored by: Barracuda Networks

    In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.

  • The Problem Facing Advanced Threat Defense

    Sponsored by: UnitedLex

    The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.

  • The Security Value of a Dozen Next Generation Firewalls

    Sponsored by: Cisco Systems, Inc.

    A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.

  • Discover the Capabilities of a Next Generation Firewall

    Sponsored by: Cisco Systems, Inc.

    This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.

  • Test Results for a Next Generation Firewall

    Sponsored by: Cisco Systems, Inc.

    In this detailed white paper, discover test results that reveal the true performance of a leading next generation firewall.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.