Research Library

Powered by

Firewall Appliances Multimedia

  • Any Device, Any User, Always Secure: Adding Macs and Mobile Devices to Your Existing Management Infrastructure

    Sponsored by: Centrify Corporation

    Can workers really use their device of choice while still allowing IT to manage the device and secure the way users access corporate resources and applications? In this webcast, guest speaker IDC analyst Peter Linstrom will explore these needs as well as trends in how the marketplace is addressing these challenges.

  • Strengthening Security From the Inside Out

    Sponsored by: Mimecast

    Listen to guest speaker Nick Hayes from Forrester Research and Steve Malone from Mimecast for insight into how technology and awareness together can strengthen defenses.

  • NGFW 101: What Is It and Why Should You Care?

    Sponsored by: Fortinet, Inc.

    This webcast presents and explores the basics of next-gen firewalls (NGFW). View now to learn what makes a firewall a next-gen firewall, the challenges and benefits of adopting NGFWs, and more.

  • Reducing Network Complexity with a Next Generation Firewall

    Sponsored by: Fortinet, Inc.

    View this brief whiteboard video to learn the additional capabilities next-gen firewalls (NGFW) provide such as application, user, or device control as well as IPS and web filtering. Access this resource now to learn the 3 key requirements to choosing NGFW as well as quick tips for evaluating platforms.

  • Network Security from the Inside: Understanding the New Model of Firewall

    Sponsored by: Fortinet, Inc.

    This 90-second whiteboard video illustrates how an internal network firewall (INFW) defends data from inside the network. Watch now to uncover the three critical criteria an INFW needs to meet to ensure network security.

  • New Capabilities of Next-Gen Firewalls

    Sponsored by: Dell Software

    This virtual environment explores why firewalls that are only 2-3 years old are failing to protect organizations from malware and other cybercrime attacks.

  • Next-Generation Firewalls: Breaking Through the Hype

    Sponsored by:

    This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs.

  • Protect your Network and your Business with a Next Gen Firewall

    Sponsored by: Juniper Networks, Inc.

    Controlling your business is no easy feat, but there is one technology that can help you do so quite readily—the firewall. But this technology isn't new, so what makes is such a powerful tool for controlling your business? Tune into the following webcast to find out now including expert tips on how to leverage next generation firewalls.

  • Information Security Decisions Security School: Evaluating Firewalls for Your Business

    Sponsored by:

    Access this security school to learn the best ways to evaluate firewalls, including the three types of firewall tests you should perform to ensure you choose the best option for your organization.

  • Reducing Security Complexity

    Sponsored by: Optus Business

    In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.

  • SonicWALL SuperMassive E10000 Series video

    Sponsored by: SonicWALL

    This video talks about the various security threats that are threatening businesses today. With the increasing amount of worms, botnets, and malware the need to an advanced security solution that can scan for all of these things and eliminate potential harmful programs is essential for every business.

  • Survival Guide: Securing Networks without Borders Show

    Sponsored by: Cisco Systems, Inc.

    In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them

  • How Application Whitelisting Can Increase Your Desktop Security

    Sponsored by: Faronics

    In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.