ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Appliances Research

  • Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis

    Sponsored by: VeriSign, Inc

    Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.

  • Technology Audit: Imperva SecureSphere Data Security Suite

    Sponsored by: Imperva

    Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.

  • Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security

    Sponsored by: Faronics

    In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.

  • To Block or Not. Is that the Question?

    Sponsored by: Palo Alto Networks

    This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement.

  • How Application Whitelisting Can Increase Your Desktop Security

    Sponsored by: Faronics

    In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.

  • Practical Advantages of Fireware® XTM for Hands-On IT Administrators

    Sponsored by: WatchGuard Technologies, Inc.

    Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Information Security Magazine - September 2009: Readers’ Choice Awards

    Sponsored by: Information Security Magazine

    This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.

  • Firewall Solutions for Small Business

    Sponsored by: Cisco Systems, Inc.

    The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.

  • Essential Guide to Threat Management

    Sponsored by: Information Security Magazine

    Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.

  • Advancing the Economics of Networking

    Sponsored by: Juniper Networks, Inc.

    Download this white paper to find out how you can change this economic model and reduce capital and operational expenses, freeing up IT budget dollars and allowing your business to invest in innovative technologies that will reduce the cost of doing business while improving the bottom line.

  • 802.1X: Port-Based Authentication Standard for Network Access Control (NAC)

    Sponsored by: Juniper Networks, Inc.

    This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.

  • High Performance Wi-Fi Demystified

    Sponsored by: Xirrus - don't use

    The Xirrus Wi-Fi Array represents the next generation in wireless LAN (WLAN) architectures.

  • Expert Ebook: Mastering PCI

    Sponsored by: Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

    This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance.

  • Unified Threat Management: The Best Defense against Blended Threats

    Sponsored by: SonicWALL

    The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.

  • Readers' Choice Awards

    Sponsored by: Information Security Magazine

    Information Security and SearchSecurity.com presented more than 1,600 readers with some 360 security products, divided into 18 categories, three categories which failed to draw sufficient reader response are covered in market articles.

  • Why Your URL Filter, Firewall, and Desktop Antivirus are all Failing You

    Sponsored by: Aladdin Knowledge Systems

    This white paper will cover current and emerging Web-based malware exploits, their methodologies, and their vectors of infection.

  • Network Firewalls

    Sponsored by: Information Security Magazine

    Cisco has been in business for more than 20 years and is emerging as a security powerhouse to be reckoned with, especially as security merges more with network operations in the enterprise.

  • Meeting Branch Office Business Needs for Security and Networking

    Sponsored by: Juniper Networks, Inc.

    Download this white paper and discover an ideal branch-office security strategy that provides fast and secure site-to-site VPN connections. You will also learn about effective tactics that help stop viruses, worms, Spyware and other threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.