ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Server HardwareResearch

  • Getting the Most out of your NextGen Firewall

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.

  • Peer Perspectives: Top Drivers, Requirements and Selection Criteria for NGFWs

    Sponsored by: Fortinet, Inc.

    This exclusive webcast takes an in-depth look at NGFWs, discussing five crucial "must-haves" for firewall success. Tune in now to find out more.

  • What Does It Take to Score 100% on the NSS Data Center Firewall Test?

    Sponsored by: Fortinet, Inc.

    This exclusive resource analyzes a firewall solution that has passed all stability, reliability, and firewall policy enforcement tests to ensure that your environment is as safe as it can be.

  • 7 Measures of Scalability for your Next-Generation Firewall

    Sponsored by: Dell Software

    Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.

  • Why Enterprises Are Really Deploying NGFWs

    Sponsored by: Fortinet, Inc.

    This exclusive webcast takes a look at five organizations that have embraced next generation firewall solutions, examining their motivations for picking those solutions as well as the key requirements they established before making a purchase.

  • NSS Labs:  2013 Next Generation Firewall Security Value Map

    Sponsored by: Fortinet, Inc.

    This crucial white paper uses analytical data of the top next generation firewall solution on the market to create a security value map (SVM). Find out which tool offers the most effective services and which best satisfies your organization's specific needs.

  • Extending Next Generation Firewalls – Security Leaders must Address Threats from Rising SSL Traffic

    Sponsored by: Fortinet, Inc.

    This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.

  • Achieve Deeper Network Security and Application Control (white paper)

    Sponsored by: Dell Software

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

  • Achieve Deeper Network Security and Application Control (eBook)

    Sponsored by: Dell Software

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

  • Gorillas on Your List – A Diversified OEM Environment Can Lower Your Risk

    Sponsored by: Dimension Data

    This informative whitepaper covers the value of breaking free from a single original equipment manufacturer and diversifying the commodities in your data center.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Next-Generation Firewall (NGFW) platform is built to meet the needs of enterprise, government, university and service provider deployments and gives you uncompromising, high-performance firewall protection. Learn how to protect against today's emerging threats in this SuperMassive NGFW datasheet.

  • How to Build a Massively Scalable Next-Generation Firewall

    Sponsored by: Dell Software

    Learn how to build a massively scalable next-generation firewall (NGFW) in this comprehensive white paper. It also outlines the kind of technical innovations needed to produce a massively scalable NGFW, and results from a benchmark test comparing the four leading next-generation firewalls.

  • IT Security Purchasing Intentions 2013

    Sponsored by: ComputerWeekly.com

    This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

  • Network security: Have you implemented a next-gen firewall?

    Sponsored by: Hewlett-Packard Company

    This guide explores why you need a next-generation firewall and how you can dictate network access, allowing in only those who are authorized.

  • GFI Reviews and awards

    Sponsored by: GFI LanGuard

    Access this exclusive resource to read reviews and uncover the awards given to one particular network security and vulnerability scanner by 80 different websites and critics. Learn why this award-winning solution is trusted by so many organizations across the globe!

  • Don’t Fire Your Firewall

    Sponsored by: AT&T Corp

    Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.

  • 10 Cool Things Your Firewall Should Do

    Sponsored by: SonicWALL

    This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.

  • Practical Advantages of Fireware® XTM for Hands-On IT Administrators

    Sponsored by: WatchGuard Technologies, Inc.

    Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Firewall Solutions for Small Business

    Sponsored by: Cisco Systems, Inc.

    The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.

  • Meeting Today's Security Challenges with End-to-end Access Control

    Sponsored by: Juniper Networks, Inc.

    This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.

  • Tackling the Top Five Network Access Control Challenges

    Sponsored by: Juniper Networks, Inc.

    This paper by Juniper Networks describes the top five networking access control challenges that companies like yours are facing and solutions that they are deploying today.

  • Advancing the Economics of Networking

    Sponsored by: Juniper Networks, Inc.

    Download this white paper to find out how you can change this economic model and reduce capital and operational expenses, freeing up IT budget dollars and allowing your business to invest in innovative technologies that will reduce the cost of doing business while improving the bottom line.

  • 802.1X: Port-Based Authentication Standard for Network Access Control (NAC)

    Sponsored by: Juniper Networks, Inc.

    This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.

  • The Advantages of Multi-Core UTM

    Sponsored by: SonicWALL

    The newest trend in firewall protection is Unified Threat Management (UTM) that not only guards against intrusion, but performs content filtering, data leakage protection, intrusion detection and anti-malware duties.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.