ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Server Hardware Research

  • Next-Generation Firewall 3301 Appliance v6.1.2 Vendor Scorecard

    Sponsored by: Forcepoint

    In this in-depth research report, gain insight into the actual performance of the new next-generation firewall; 3301 Appliance 6.1.2.

  • Testing NGFW: Three Points of Value Critical to your Enterprise

    Sponsored by: Forcepoint

    In this webcast learn about a next generation firewall (NGFW) offering that can give you the ability to scale to over 2,000 devices form a single console, multi-link business continuity for transparent failover, and more.

  • The 2017 State of the Firewall

    Sponsored by: FireMon

    Access FireMon's 3rd Annual State of the Firewall Report to learn how your peers feel about firewall infrastructure and management challenges, as well as the adoption and impact of emerging tech such as SDN, cloud, and IoT.

  • Automation Isn't One-Size-Fits-All

    Sponsored by: FireMon

    In this white paper, learn how intelligent policy automation can take the pressure off your firewall team by telling you which access to approve and which to deny, increasing speed and security of change management workflows.

  • Why Firewalls Alone Are No Longer Enough

    Sponsored by: VMware

    What do you do when a threat makes it past the firewall and starts moving laterally inside the data center? To combat today's advanced cyberattacks, many organizations are moving past archaic firewall protection and empowering their security with network virtualization and micro-segmentation.

  • Putting a Next-Generation Firewall Through Its Paces

    Sponsored by: Forcepoint

    See how the Forcepoint Stonesoft Next-Generation Firewall was given a detailed product scorecard after being subjected to thorough testing for security effectiveness (exploits, false positives, etc.), performance (UDP throughput, max capacity, etc.), stability and reliability, and total cost of ownership.

  • NSS Labs NGFW Test Report

    Sponsored by: Forcepoint

    In this lab report from NSS Labs, discover how a Next-Generation Firewall measures up to its boasts on the market. Learn what's important to NGFWs, how they come up short, how they surpass expectations, and everything in-between.

  • IT Security Purchasing Intentions 2013

    Sponsored by: ComputerWeekly.com

    This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe.

  • Open Sandwich Architecture Provides Scalable Performance and High Availability for Next-Generation Firewalls

    Sponsored by: Array Networks

    As network speeds and network security requirements continue to evolve, meeting your next-generation firewall's (NGFW) requirements by scaling up hardware capabilities becomes more difficult. Read this white paper to discover how employing application delivery controllers can help you meet your NGFW's requirements without scaling hardware.

  • The Security Value of a Dozen Next Generation Firewalls

    Sponsored by: Cisco Systems, Inc.

    A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.

  • Test Results for a Next Generation Firewall

    Sponsored by: Cisco Systems, Inc.

    In this detailed white paper, discover test results that reveal the true performance of a leading next generation firewall.

  • Getting the Most out of your NextGen Firewall

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.

  • Achieve Deeper Network Security and Application Control

    Sponsored by: DellEMC and Intel®

    Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.

  • Gorillas on Your List – A Diversified OEM Environment Can Lower Your Risk

    Sponsored by: Dimension Data

    This informative whitepaper covers the value of breaking free from a single original equipment manufacturer and diversifying the commodities in your data center.

  • Network security: Have you implemented a next-gen firewall?

    Sponsored by: Hewlett Packard Enterprise

    This guide explores why you need a next-generation firewall and how you can dictate network access, allowing in only those who are authorized.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • GFI Reviews and awards

    Sponsored by: GFI LanGuard

    Access this exclusive resource to read reviews and uncover the awards given to one particular network security and vulnerability scanner by 80 different websites and critics. Learn why this award-winning solution is trusted by so many organizations across the globe!

  • Don’t Fire Your Firewall

    Sponsored by: AT&T Corp

    Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.

  • 10 Cool Things Your Firewall Should Do

    Sponsored by: SonicWALL

    This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.

  • Practical Advantages of Fireware® XTM for Hands-On IT Administrators

    Sponsored by: WatchGuard Technologies, Inc.

    Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Firewall Solutions for Small Business

    Sponsored by: Cisco Systems, Inc.

    The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.

  • Meeting Today's Security Challenges with End-to-end Access Control

    Sponsored by: Juniper Networks, Inc.

    This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.

  • Tackling the Top Five Network Access Control Challenges

    Sponsored by: Juniper Networks, Inc.

    This paper by Juniper Networks describes the top five networking access control challenges that companies like yours are facing and solutions that they are deploying today.

  • Advancing the Economics of Networking

    Sponsored by: Juniper Networks, Inc.

    Download this white paper to find out how you can change this economic model and reduce capital and operational expenses, freeing up IT budget dollars and allowing your business to invest in innovative technologies that will reduce the cost of doing business while improving the bottom line.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2017 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.