ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Management Research

  • 10 Things to Test in Your Future Next-Generation Firewall

    Sponsored by: Palo Alto Networks

    How can you determine if the features of your new next-generation firewall are what your organization needs to grow and move forward? The answer is simple: you test it. In this white paper, explore 10 points to consider and actively test in your current security infrastructure as well as your future next-generation firewall.

  • 4 Key Elements Of An ML-Powered NGFW: How Machine Learning Is Disrupting Network Security

    Sponsored by: Palo Alto Networks

    Bad actors and security teams are trading blows when it comes to leveraging automation, with both sides scaling their operations. But as more and more organizations leverage cloud, environments become more complex and more vulnerable. Delve into this white paper to learn how machine learning (ML) can aid in securing your network.

  • Internal Firewalls

    Sponsored by: VMware

    Although some operating systems are more secure than others, most used today were not designed for security from the ground up, leaving many holes in IT infrastructure as a result. Security teams need to think about compartmentalizing their network to limit damage from intrusions. Leverage this e-book to see how internal firewalls can help.

  • Next-Generation Firewall Buyer’s Guide

    Sponsored by: Palo Alto Networks

    Cloud adoption, big data analytics, machine learning and automation are all accelerating the delivery of applications, which in and of themselves are becoming increasingly accessible. However, this also means that apps are more vulnerable than ever. Browse this guide to learn how Next-Gen Firewalls can minimize risk without slowing you down.

  • Pioneering DIY retailer future proofs SD-WAN security.

    Sponsored by: Barracuda

    Organizations looking to migrate firewall security, simplify network management, improve visibility, enhance connectivity and regulate traffic would gain much valuable information from this case study. It details a DIY retail chain that faced these challenges and how they were able to overcome them through upgrading their security architecture.

  • Dutch Insurance Provider Deploys Barracuda Firewalls from Data Unit

    Sponsored by: Barracuda

    Aevitae, a leading Dutch insurance provider company, was not satisfied with any of their existing firewalls solutions. They sought a solution that would provide seamless, end-to-end data visibility across their hybrid environment. In this case study, learn why Aevitae ultimately decided to partner with Barracuda Networks.

  • How to Simplify Monitoring for Complex Network Devices

    Sponsored by: SolarWinds, Inc.

    If you’ve ever been tasked with monitoring and managing Palo Alto Networks firewalls, Cisco ASAs, F5 load balancers or Cisco Nexus devices, you understand this task can be very complex. Download this e-book to explore a number of ways to overcome common challenges of monitoring and managing these devices.

  • A Massively Scalable Approach to Network Security

    Sponsored by: SonicWall

    Learn about a new approach securing your network in this white paper. It explores a network-based model for scaling a next-generation firewall (NGFW) that can help provide better performance, increase resiliency and lower TCO.

  • Barracuda SD-Wan Zero Touch Deployment

    Sponsored by: Barracuda

    Tune into this video for a brief walkthrough of how to use Barracuda CloudGen Firewall to deploy SD-WAN.

  • Barracuda CloudGen Firewall Savings Calculator

    Sponsored by: Barracuda

    How could your business benefit from a cloud-based firewall that includes protection against advanced persistent threats with full SD-WAN, link balancing, and WAN Optimization discipline? Find out by using the following cost and savings calculator for Barracuda's CloudGen Firewall.

  • What to Include in an SD-WAN Security Checklist

    Sponsored by: Citrix

    SD-WAN can improve security in many ways. Simply migrating to a viable SD-WAN offering can bring benefits. But SD-WAN also provides security features to protect the traffic it manages, as well as features that protect the offering itself. Read this expert e-guide to uncover 4 different areas where enterprises should consider SD-WAN and security.

  • Firewall Buyer's Guide

    Sponsored by: Palo Alto Networks

    Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.

  • How the Basics of Network Security Have Evolved

    Sponsored by: Fortinet, Inc.

    In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

  • How to Resolve a Web Application Security Vulnerability

    Sponsored by: Veracode, Inc.

    Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.

  • Firewalls Revamping Your Policy and Dynamics

    Sponsored by: Barracuda Networks

    In this e-guide, discover not only how to add the capabilities of next-gen firewalls to your security portfolio, but also the options an enterprise needs for their management. Uncover 3 management considerations to build out your firewall strategy.

  • What to Look for in Next-Generation Firewalls

    Sponsored by: SearchSecurity.com

    This Buyer's Guide goes in-depth on the process of selecting the best next-generation firewall for your company and how to ensure your organization has a clear understanding of its security requirements in the modern threat landscape.

  • Five Critical Rules for Firewall Management: Lessons from the Field

    Sponsored by: Dell SecureWorks

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.

  • What to Look for in Web Application Firewall Products

    Sponsored by: SearchSecurity.com

    In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Network Protection and UTM Buyer's Guide

    Sponsored by: Sophos

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

  • Getting the Most out of your NextGen Firewall

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.

  • AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy

    Sponsored by: BitGlass

    In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.

  • Making Networks Virtual: The Latest on SDN Technologies

    Sponsored by: SearchNetworking.com

    This Technical Guide reviews SDN technologies, network virtualization fundamentals and the latest developments. It provides network engineers the info they need on how to use them in a modern hybrid network architecture.

  • MicroScope May 2014: An issue covering changes in the security market

    Sponsored by: MicroScope

    An issue highlighting the changing security landscape and the opportunities for resellers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences