ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Appliances Research

  • Gartner Magic Quadrant for Unified Threat Management

    Sponsored by: Sophos

    Read an overview of the unified threat management market today and uncover an analysis of fourteen of the vendors on the market to get help finding your ideal UTM solution.

  • How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware

    Sponsored by: Infoblox

    Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.

  • Next-generation firewalls and your security strategy

    Sponsored by: Cisco

    This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.

  • Virtualization Security: Protecting Virtualized Environments

    Sponsored by: TechTarget ComputerWeekly.com

    This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.

  • DNS Firewalls and Defense Tactics

    Sponsored by: Infoblox

    Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.

  • Solution Note: Enabling the Secure Use of Facebook

    Sponsored by: Palo Alto Networks

    With millions of users, Facebook offers significant opportunities for organizations to conduct research, execute targeted marketing, increase awareness and more. But enabling the use of Facebook introduces a number of security risks. In this paper, uncover how to reap the benefits of social networking while doing it in a safe and secure manner.

  • Protecting your Network and Data Center with Next-Gen Firewalls

    Sponsored by: Palo Alto Networks

    Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs.

  • Web application firewalls: How they can help protect customers

    Sponsored by: Astaro

    In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.

  • Next-generation firewalls are mainstream: What to expect

    Sponsored by: Palo Alto Networks

    Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.

  • Combating Today’s Security Threats

    Sponsored by: TechTarget Security

    In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.

  • Understanding the Value behind Enterprise Application-Aware Firewalls

    Sponsored by: Dell SonicWALL

    This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.

  • Thwarting Sophisticated Attacks with Today’s Firewalls

    Sponsored by: TechTarget Security

    This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).

  • Success Story: Astaro Gets the Checkered Flag at F1 Boston

    Sponsored by: Astaro

    New England’s premier high performance kart racing venue, F1 Boston, faced issues with its current firewall protection solution. View this case study to learn how switching to Astaro Security Gateway met F1 Boston’s security needs, while being easy to set up and manage at a more affordable cost.

  • Presentation Transcript: Integrating Virtual-Aware Security Technologies

    Sponsored by: Intel

    There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options.

  • Technical guide on Web Security Gateways

    Sponsored by: TechTarget Security

    Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.

  • Magic Quadrant for Mobile Data Protection

    Sponsored by: Sophos

    This Magic Quadrant is a snapshot of the overall market that ranks vendors against each other, according to competitive criteria. Vendors in any quadrant, as well as those not ranked on the Magic Quadrant, may be appropriate for your enterprise's needs and budget.

  • Alternatives for Securing Virtual Networks

    Sponsored by: Juniper Networks, Inc.

    In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks.

  • SonicWALL SuperMassive E10000 Series video

    Sponsored by: SonicWALL

    This video talks about the various security threats that are threatening businesses today. With the increasing amount of worms, botnets, and malware the need to an advanced security solution that can scan for all of these things and eliminate potential harmful programs is essential for every business.

  • Intelligent real-time protection and application control

    Sponsored by: SonicWALL

    It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network.

  • Next-generation capabilities of enterprise application-aware firewalls

    Sponsored by: SonicWALL

    The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.

  • Next-Generation Firewall

    Sponsored by: SonicWALL

    It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.

  • How Application Intelligence and Control enables network security in the wake of Web 2.0, Cloud Computing and Mobility

    Sponsored by: SonicWALL

    This paper explores how innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into corporate and government networks.

  • How Security is Changing to Support Virtualization and Cloud Computing

    Sponsored by: Trend Micro, Inc.

    In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data.

  • BGMX Retail Solutions Case Study

    Sponsored by: SonicWALL

    BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.

  • E-Book: Technical Guide on Web Application Firewalls

    Sponsored by: TechTarget Security

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.