ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Appliances Research

  • Web Application Firewall (WAF) Global Market Analysis

    Sponsored by: Akamai Technologies

    Web application firewalls, or WAFs may be the best way to provide that missing insight in web app security. This research paper explores the evolution of WAFs, and what's driving the market forward today.

  • Increase Network Security Resilience

    Sponsored by: Ixia

    Is your overall security architecture resilient enough to limit the risk of downtime to your network? Explore how you can build a more resilient IT security architecture to complement your firewall.

  • Solution Brief: Running Application Firewalls on Network Functions Platforms

    Sponsored by: Array Networks

    Learn how two industry leaders are combining best-of-breed solutions in virtual application delivery and web application security to provide all the benefits of virtualization with the performance level of dedicated hardware appliances.

  • Next-Generation Firewall 3301 Appliance v6.1.2 Vendor Scorecard

    Sponsored by: Forcepoint

    In this in-depth research report, gain insight into the actual performance of the new next-generation firewall; 3301 Appliance 6.1.2.

  • Digital Transformation and Network Security

    Sponsored by: Forcepoint

    In this ESG white paper, learn how digital transformation is changing the security landscape, and how pros are adapting to meet these new challenges.

  • Testing NGFW: Three Points of Value Critical to your Enterprise

    Sponsored by: Forcepoint

    In this webcast learn about a next generation firewall (NGFW) offering that can give you the ability to scale to over 2,000 devices form a single console, multi-link business continuity for transparent failover, and more.

  • Automation Isn't One-Size-Fits-All

    Sponsored by: FireMon

    In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.

  • 10 Things Your Next Firewall Must Do

    Sponsored by: Palo Alto Networks

    Uncover the 10 things your next firewall must do in order to strike the balance between blocking attacks and allowing mission-critical apps to run when and where you need them.

  • Firewall Clean Up Recommendations

    Sponsored by: FireMon

    At the core of the firewall is the policy that enforces what access is permitted. Discover the benefits of proper firewall policy for your organization and learn the main causes of firewall policy mistakes.

  • NSS Labs NGFW Test Report

    Sponsored by: Forcepoint

    In this lab report from NSS Labs, discover how a Next-Generation Firewall measures up to its boasts on the market. Learn what's important to NGFWs, how they come up short, how they surpass expectations, and everything in-between.

  • What to Look for in Endpoint Antimalware Tools

    Sponsored by: SearchSecurity.com

    Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.

  • Next Generation Firewall Comparative Report

    Sponsored by: Cisco Systems, Inc.

    This report examines 11 next generation firewalls, evaluating for overall security, performance, and TCO. Take a look to see which providers lead the pack, which ones to avoid, and more.

  • Cisco ASA 5500 Series Adaptive Security Appliances

    Sponsored by: Cisco Systems, Inc.

    Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.

  • How the Basics of Network Security Have Evolved

    Sponsored by: Fortinet, Inc.

    In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

  • Businesses Blame Rivals for DDoS Attacks& The Importance of Cloud WAF

    Sponsored by: F5 Networks

    More than 40% of businesses hit by a DDoS attack believe their competitors were behind it, according to research by Kaspersky Lab and B2B International. But is there truth behind this suspicion? In this expert e-guide, learn ]about the real culprits behind DDoS attacks, and get some insight into the emergence of cloud WAF for application security.

  • End Web Application Security Risks with WAF

    Sponsored by: F5 Networks

    In this expert e-guide, educate yourself on all things WAF by discovering how a WAF works, the best WAF features and more. Additionally, learn how to further resolve web application vulnerabilities.

  • Plan Your Firewall Migration to Increase Security Resilience

    Sponsored by: Ixia

    This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.

  • IT Needs to Change its Mindset Around Mobile Data Access

    Sponsored by: Hewlett Packard - Intel Xeon

    To successfully support enterprise mobility, IT admins need to change the way they think about mobile data access, security, and more. This e-guide details four things to keep in mind as your enterprise embraces this mobile world.

  • Open Sandwich Architecture Provides Scalable Performance and High Availability for Next-Generation Firewalls

    Sponsored by: Array Networks

    As network speeds and network security requirements continue to evolve, meeting your next-generation firewall's (NGFW) requirements by scaling up hardware capabilities becomes more difficult. Read this white paper to discover how employing application delivery controllers can help you meet your NGFW's requirements without scaling hardware.

  • New AWS Migration Tools Target Big Data Behind a Firewall

    Sponsored by: New Relic

    Amazon Web Services (AWS) recently added a multitude of capabilities to its public cloud that greatly reduce the data migration problem and decrease the fear of data breaches. This expert e-guide highlights all the new features of AWS that could soon be positively impacting your business.

  • Whiteboard: Barracuda Web Application Firewall

    Sponsored by: Barracuda Networks

    In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.

  • The Problem Facing Advanced Threat Defense

    Sponsored by: UnitedLex

    The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.

  • The Security Value of a Dozen Next Generation Firewalls

    Sponsored by: Cisco Systems, Inc.

    A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.

  • Discover the Capabilities of a Next Generation Firewall

    Sponsored by: Cisco Systems, Inc.

    This in-depth white paper provides a close look at a next generation firewall, describing each of its capabilities in detail.

  • Test Results for a Next Generation Firewall

    Sponsored by: Cisco Systems, Inc.

    In this detailed white paper, discover test results that reveal the true performance of a leading next generation firewall.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.