ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Appliances Research

  • App Security: Shore up the Weaknesses in Your WAF

    Sponsored by: tCell

    Delve into the shortcomings of web application firewalls (WAFs) and how to shore up your defenses. Uncover the top 5 requirements for an application immune system and how to protect your web applications and modernize your security policy to stand firm against today's threats landscape.

  • Putting a Next-Generation Firewall Through Its Paces

    Sponsored by: Forcepoint

    See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability ant total cost of ownership.

  • IDC Analyst Connection: Internal Segmentation Firewalls

    Sponsored by: Fortinet, Inc.

    Networks have changed drastically since the first firewall was introduced, and as a result, networking pros can no longer assume traffic within the perimeter can be trusted. In this Q&A with IDC's Chris Christiansen, learn how internal segmentation firewalls can help you secure your expanding network.

  • Plan Your Firewall Migration to Increase Security Resilience

    Sponsored by: Ixia

    This paper examines best practices for maximizing uptime and achieving high availability during a firewall migration.

  • 10 Things Your Next Firewall Must Do

    Sponsored by: Palo Alto Networks

    Uncover the 10 things your next firewall must do in order to strike the balance between blocking attacks and allowing mission-critical apps to run when and where you need them.

  • Secure and Accelerate User Access to Web Applications

    Sponsored by: Symantec & Blue Coat Systems

    Learn how to secure and accelerate web applications using Web Application Firewall (WAF) deployments in trusted and untrusted web environments. Deliver the fast, latency-free web experience users expect from anywhere and to any device.

  • Deliver Complete Security for Enterprise Web Applications

    Sponsored by: Symantec & Blue Coat Systems

    Learn how to fully protect web applications without adversely affecting web performance for your users. Address all of today's critical web vulnerabilities while at the same time accelerating web applications for optimal productivity.

  • Can One Enterprise Firewall Tool Protect Your Entire Network?

    Sponsored by: Fortinet, Inc.

    Discover how to protect your entire attack surface, from IoT to cloud and from users to data, behind a single pane of glass. Learn why one network security operating system could be all you need to ensure end-to-end network protection against today's most advanced security threats and targeted attacks.

  • Block Evolving Cyber Threats Targeting Your Cloud Apps

    Sponsored by: Barracuda Networks

    Discover a next-generation firewall that can stand up to new and evolving cyber threats targeting your cloud apps. Gain antivirus and web filtering functionality without the need for additional IT staff or special training.

  • Why NGFWs Are Becoming the New Standard in Enterprise Security

    Sponsored by: Fortinet, Inc.

    The next-generation firewall (NGFW) is quickly becoming the new standard approach for enterprise security. Discover how your organization can add a high performance, highly effective NGFW without slowing down daily business operations. Learn how you can achieve unparalleled protection, ease of use and ultrafast performance with your NGFW.

  • Buying Criteria for Next-Generation Network Security

    Sponsored by: Cisco Systems, Inc.

    Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.

  • Beyond Application Visibility and Control: What an NGFW Must Be

    Sponsored by: Cisco Systems, Inc.

    Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.

  • Next-Generation Firewalls: An Investment Checklist

    Sponsored by: Cisco Systems, Inc.

    What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.

  • Open Sandwich Architecture Provides Scalable Performance and High Availability for Next-Generation Firewalls

    Sponsored by: Array Networks

    As network speeds and network security requirements continue to evolve, meeting your next-generation firewall's (NGFW) requirements by scaling up hardware capabilities becomes more difficult. Read this white paper to discover how employing application delivery controllers can help you meet your NGFW's requirements without scaling hardware.

  • Barracuda NextGen Firewalls protect the ever-expanding operation of Georgia‚Äôs leading telecoms provider, Geocell

    Sponsored by: Barracuda Networks

    Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.

  • Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics

    Sponsored by: Barracuda Networks

    Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.

  • Eissmann Group Automotive Evaluates NextGen Firewall F-Series

    Sponsored by: Barracuda Networks

    Learn what went into Eissmann Group Automotive's decision to replace their firewall when their existing routers were reaching their performance limits.

  • Whiteboard: Barracuda Web Application Firewall

    Sponsored by: Barracuda Networks

    In this video, you will learn about common types of web application attacks and what you can do to save your website. Watch now to discover how firewalls can best protect your site against targeted and automated attacks. Protect the integrity of your data and safeguard the reputation of your business.

  • Cyberthreat Defense Report

    Sponsored by: LogRhythm, Inc.

    This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.

  • Internal Segmentation Firewall: Security Where You Need It, When You Need It

    Sponsored by: Fortinet, Inc.

    While an edge firewall can do a great job of protecting the network perimeter, it can't help with internal attacks after a breach occurs. This resource describes how an internal segmentation firewall architecture protects network segments from malicious code that makes its way into the internal network.

  • Why the Era of Perimeter-Only Security Is Over

    Sponsored by: Fortinet, Inc.

    With today's increasingly sophisticated attacks, it's inevitable that some threats will penetrate the enterprise network's perimeter. Access this resource to discover how an internal segmentation firewall can strengthen your enterprise's overall security posture.

  • Security From the Inside Out: New Breach Defense Strategies

    Sponsored by: Fortinet, Inc.

    This resource explains why the traditional perimeter firewall isn't enough and describes how internal segmentation firewalls can help your network react to today's advanced threats. Read on to discover what you need to look for when deciding on an internal segmentation firewall solution.

  • How to Buy: Assessing Next-Gen Firewalls

    Sponsored by: Fortinet, Inc.

    Is there a next-gen firewall in your future? Inside this How to Buy guide, IT security expert Dave Shackleford offers his advice to help you purchase the best platform to meet your enterprise needs.

  • IT Needs to Change its Mindset Around Mobile Data Access

    Sponsored by: Hewlett Packard - Intel Xeon

    To successfully support enterprise mobility, IT admins need to change the way they think about mobile data access, security, and more. This e-guide details four things to keep in mind as your enterprise embraces this mobile world.

  • New AWS Migration Tools Target Big Data Behind a Firewall

    Sponsored by: New Relic

    Amazon Web Services (AWS) recently added a multitude of capabilities to its public cloud that greatly reduce the data migration problem and decrease the fear of data breaches. This expert e-guide highlights all the new features of AWS that could soon be positively impacting your business.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.