ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Management Research

  • Advanced Secure Access for Remote and Mobile Workers

    Sponsored by: Barracuda Networks

    Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.

  • Not All Next-Generation Firewalls Are Created Equal

    Sponsored by: Barracuda Networks

    This paper digs into how to build your own secure application delivery network using a firewall that can appropriately optimize traffic between locations for latency and throughput. Read on to see this framework and to learn how your organization can benefit from it.

  • Protecting IIoT Devices from Ransomware and Botnet Infections at Scale

    Sponsored by: Barracuda Networks

    To achieve multi-tiered secure access and cloud scalable security for IIoT devices, read this sheet. It provides you an overview of a secure access controller built for dispersed devices and environments.

  • Barracuda Cloud Generation Firewall for IoT Deployments

    Sponsored by: Barracuda Networks

    To learn how to connect IoT devices and micro-networks to your corporate data center—whether it is centralized or distributed—read the following resource. It highlights a firewall designed to help you secure IoT traffic easily and economically.

  • Eissmann Group Automotive Places Trust in Barracuda's CloudGen Firewall

    Sponsored by: Barracuda Networks

    Of the utmost importance to the Eissmann Group was obtaining a reliable intrusion prevention system, improving performance, and managing their distributed environment with ease. Read this case study to discover how they ultimately achieved their objectives with a cloud-based firewall.

  • RHI Secures Global Locations with Barracuda

    Sponsored by: Barracuda Networks

    As they hit 90 locations, RHI's Frame Relay and MAN became incapable of ensuring reliable connections and efficient network security for the dispersed enterprise. So how did they manage to centralize their firewall management and increase bandwidth? Read the following case study to find out.

  • Barracuda CloudGen Firewalls Protect Geocell's Expanding Operations

    Sponsored by: Barracuda Networks

    As telecom provider Geocell expanded, they found themselves spending too much time administering firewalls to each location—an incredibly tedious task. Learn more about the next-generation firewall that seamlessly centralized their network management controls in this case study.

  • FineLine Technologies Secures Its Multi-location Network with Barracuda

    Sponsored by: Barracuda Networks

    FineLine Technologies struggled to find a robust firewall system that could be easily deployed across their global offices. This case study covers FineLine's journey and demonstrates how they found a firewall that could secure data across their globally dispersed network.

  • Secure Branch-to-Public-Cloud Connectivity with SD-WAN

    Sponsored by: Barracuda

    This paper highlights an SD-WAN architecture that manages security, networking, and app prioritization transparently across your entire organization—including all public cloud deployments. To learn how to achieve always-on app availability regardless of branch or office location, view the paper here.

  • MPLS Replacement with Broadband and Secure SD-WAN

    Sponsored by: Barracuda

    This paper presents an alternative: using SD-WAN protected by cloud-based firewalls to reduce costs and increase availability. Read on to learn how this approach simplifies deployment for all of the firewalls across your sites and gives you the added benefit of built-in redundancy and a more robust network.

  • Firewall Buyer's Guide

    Sponsored by: Palo Alto Networks

    Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.

  • How the Basics of Network Security Have Evolved

    Sponsored by: Fortinet, Inc.

    In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.

  • How to Resolve a Web Application Security Vulnerability

    Sponsored by: Veracode, Inc.

    Discover the importance of application security testing and Web application firewalls (WAFs) in the delivery of modern web-based application deployments.

  • Firewalls Revamping Your Policy and Dynamics

    Sponsored by: Barracuda Networks

    In this e-guide, discover not only how to add the capabilities of next-gen firewalls to your security portfolio, but also the options an enterprise needs for their management. Uncover 3 management considerations to build out your firewall strategy.

  • What to Look for in Next-Generation Firewalls

    Sponsored by: SearchSecurity.com

    This Buyer's Guide goes in-depth on the process of selecting the best next-generation firewall for your company and how to ensure your organization has a clear understanding of its security requirements in the modern threat landscape.

  • Five Critical Rules for Firewall Management: Lessons from the Field

    Sponsored by: Dell SecureWorks

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.

  • What to Look for in Web Application Firewall Products

    Sponsored by: SearchSecurity.com

    In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.

  • Beyond Passwords: Protect the mobile enterprise with smarter security solutions

    Sponsored by: IBM

    Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.

  • Countering Cyber-Crime with a Sharp Eye and a Clear Plan

    Sponsored by: SearchSecurity.com

    Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.

  • Network Protection and UTM Buyer's Guide

    Sponsored by: Sophos

    This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.

  • Getting the Most out of your NextGen Firewall

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.

  • AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy

    Sponsored by: BitGlass

    In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.

  • Making Networks Virtual: The Latest on SDN Technologies

    Sponsored by: SearchNetworking.com

    This Technical Guide reviews SDN technologies, network virtualization fundamentals and the latest developments. It provides network engineers the info they need on how to use them in a modern hybrid network architecture.

  • MicroScope May 2014: An issue covering changes in the security market

    Sponsored by: MicroScope

    An issue highlighting the changing security landscape and the opportunities for resellers.

  • Selecting a Next-Generation Firewall: Top 10 Considerations

    Sponsored by: Cisco

    In this white paper, learn about the 10 features your next-generation firewall should have to protect your network from a range of threats.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.