ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Appliances White Papers

  • Competitive Landscape: Carrier-Class Network Firewalls

    Sponsored by: Juniper Networks, Inc.

    As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.

  • IT Needs to Change its Mindset Around Mobile Data Access

    Sponsored by: Hewlett Packard - Intel Xeon

    To successfully support enterprise mobility, IT admins need to change the way they think about mobile data access, security, and more. This e-guide details four things to keep in mind as your enterprise embraces this mobile world.

  • Network Security at a Glance: Southern Cross Hospitals

    Sponsored by: Palo Alto Networks

    Uncover the results Southern Cross Hospitals saw when they adopted a next-generation security platform, including: increased network visibility and control over Internet traffic, improved Internet performance and resilience for multiple sites, and more.

  • Web Application Security: Is Your Site Vulnerable to Attackers?

    Sponsored by: Akamai

    This short infographic shows you the importance of intelligent security for your web applications, including the necessity of a web application firewall (WAF). Learn how to seamlessly integrate and manage a cloud-based WAF to keep hackers out of your business.

  • Tranforming your Security

    Sponsored by: Fortinet, Inc.

    Fortunately, we're entering into a new era of firewall technology for your modern, borderless network. Discover how to consolidate network security across your entire threat surface, thus increasing security effectiveness and reducing complexity. Gain central visibility and control of your network, managed through a single pane of glass.

  • Open Sandwich Architecture Provides Scalable Performance and High Availability for Next-Generation Firewalls

    Sponsored by: Array Networks

    As network speeds and network security requirements continue to evolve, meeting your next-generation firewall's (NGFW) requirements by scaling up hardware capabilities becomes more difficult. Read this white paper to discover how employing application delivery controllers can help you meet your NGFW's requirements without scaling hardware.

  • Internal Segmentation Firewall: Protecting Your Network From the Inside-Out

    Sponsored by: Fortinet, Inc.

    Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.

  • Barracuda NextGen Firewalls protect the ever-expanding operation of Georgia’s leading telecoms provider, Geocell

    Sponsored by: Barracuda Networks

    Geocell chose a next-generation firewall that fit every criteria and beyond. Within only two months, business-critical apps were running smoothly and network management controls were centralized. Learn more about how Geocell's experiences could benefit your network.

  • Barracuda NextGen Firewall F Boosts Wireless Network Security for5,000 Users During the 2015 European Youth Olympics

    Sponsored by: Barracuda Networks

    Zurab Tuskia, head of IT infrastructure of the Festival, chose Wi-Fi secured by a next-generation firewall for its ease of deployment and cost effectiveness over other, more complex solutions. Learn more about their decision that provided them live traffic monitoring and rejection capabilities unwanted of p2p traffic.

  • Eissmann Group Automotive Evaluates NextGen Firewall F-Series

    Sponsored by: Barracuda Networks

    Learn what went into Eissmann Group Automotive's decision to replace their firewall when their existing routers were reaching their performance limits.

  • Security From the Inside Out

    Sponsored by: Fortinet, Inc.

    This e-book discusses the failings of traditional perimeter-based security measures, and shows how specialized internal segmentation firewalls can help your network respond to modern threats.

  • Protect Your Network From the Inside-Out: Internal Segmentation Firewall (ISFW)

    Sponsored by: Fortinet, Inc.

    This white paper teaches you about Internal Segmentation Firewalls (ISFW), which can be deployed rapidly with minimum disruption to business operations. Access now and learn how to gain instant visibility and protection for your internal network.

  • 2016 Cyberthreat Defense Report

    Sponsored by: LogRhythm, Inc.

    This 36-page report reveals the results from 1,000 IT security pros primary concerns about existing cybersecurity threats, defense strategies, and whether investing more in IT improves your chances of securing your organization against these threats.

  • Gartner Magic Quadrant for Web Application Firewalls

    Sponsored by: Imperva

    New Gartner Magic Quadrant for Web Application Firewalls helps security leaders understand the WAF market, as well as what to look for in a WAF solution. Download the report and learn the importance of comprehensive protection, detection accuracy, management capabilities and deployment options.

  • Do You Need a VPN, Firewall or Both?

    Sponsored by: Global Knowledge

    In this Global Knowledge white paper, discover when VPNs and firewalls are most effective, suggestions for deployment, when a unified threat management system is worth considering, and hardware vs. software concerns.

  • 10 Features Every Web App Firewall Should Provide

    Sponsored by: Imperva

    This paper explains in detail the 10 features that every Web application firewall must provide.

  • New AWS Migration Tools Target Big Data Behind a Firewall

    Sponsored by: New Relic

    Amazon Web Services (AWS) recently added a multitude of capabilities to its public cloud that greatly reduce the data migration problem and decrease the fear of data breaches. This expert e-guide highlights all the new features of AWS that could soon be positively impacting your business.

  • Internal Segmentation Firewall: Security Where You Need It, When You Need It

    Sponsored by: Fortinet, Inc.

    While an edge firewall can do a great job of protecting the network perimeter, it can't help with internal attacks after a breach occurs. This resource describes how an internal segmentation firewall architecture protects network segments from malicious code that makes its way into the internal network.

  • Why the Era of Perimeter-Only Security Is Over

    Sponsored by: Fortinet, Inc.

    With today's increasingly sophisticated attacks, it's inevitable that some threats will penetrate the enterprise network's perimeter. Access this resource to discover how an internal segmentation firewall can strengthen your enterprise's overall security posture.

  • Security From the Inside Out: New Breach Defense Strategies

    Sponsored by: Fortinet, Inc.

    This resource explains why the traditional perimeter firewall isn't enough and describes how internal segmentation firewalls can help your network react to today's advanced threats. Read on to discover what you need to look for when deciding on an internal segmentation firewall solution.

  • Internal Segmentation Firewalls: Protection from the Inside Out

    Sponsored by: Fortinet, Inc.

    This white paper examines internal segmentation firewalls (ISFW), and demonstrates how ISFWs can protect your internal network. Access now and find out the challenges and benefits of ISFWs, as well as the features you should look for when choosing a solution.

  • Internal Segmentation Firewalls for the Healthcare Industry

    Sponsored by: Fortinet, Inc.

    Learn how an internal segmentation firewall can benefit your enterprise by addressing internal threats and reducing data breaches in healthcare. View this resource to discover how you can securely deliver platforms that can enhance patient care, improve provider efficiency, and better comply with regulatory mandates.

  • The Problem Facing Advanced Threat Defense

    Sponsored by: UnitedLex

    The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.

  • Network Security for the Digital Classroom

    Sponsored by: Fortinet, Inc.

    Access this brief resource to uncover top network security strategies for educational institutions. Discover how you can efficiently manage bandwidth, protect data, and meet compliance standards in the classroom.

  • Case Study: University Achieves High Level of Network Security Protection at Low Cost

    Sponsored by: Fortinet, Inc.

    Access this brief case study to learn how a leading UK university implemented a network security solution that is not only affordable but also effective. Discover how they achieved high-level protection and benefits like web content/filtering, data leak protection, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.