Firewall Management Research
-
Malware Attacks Demand a New Malware Defense Approach
Sponsored by: TechTarget SecurityCustomized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
-
How a next-generation firewall prevents application-layer attacks
Sponsored by: TechTarget SecurityThe application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
-
Security as a Service: Benefits and Risks of Cloud-Based Security
Sponsored by: TechTarget SecurityUncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.
-
Mobile: The Technology Game-Changer in 2013
Sponsored by: TechTarget SecurityTechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
-
Web Application Firewalls: Patching, SDLC Key for Security, Compliance
Sponsored by: TechTarget SecurityIn this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
-
September Information Security Magazine
Sponsored by: TechTarget SecurityIndustry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.
-
Next-Generation Firewalls (NGFWs)
Sponsored by: AlgoSecThis paper will highlight tips to effectively implement next-generation firewalls and optimize policies so that you can enjoy the clear benefits without falling into overly complex, unmanageable and risky policy traps.
-
Voice over IP (VoIP) Growth and the Strain on Network Security
Sponsored by: WatchGuard Technologies, Inc.Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
-
SuperMassive Series data sheet
Sponsored by: Dell SoftwareThe Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.
-
Top 5 DNS Security Attack Risks and How to Avoid Them
Sponsored by: InfobloxThis paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
-
EGuide: Testing Enterprise Firewalls
Sponsored by: SophosIn this expert guide from SearchSecurity.com, learn about the three types of firewall tests you should perform to ensure that the solution you end up selecting is the best for your organization's specific needs.
-
SIEM Demo: Get Complete Security Visibility in an Hour
Sponsored by: AT&T CybersecurityWatch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.
-
A CIO's Five-Point Plan for Managing Endpoint Security
Sponsored by: Dell KACEManaging endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
-
Threat Prevention Techniques: Best Practices for Threat Management
Sponsored by: GeoTrust, Inc.SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.
-
Next-Generation IPS for Dummies
Sponsored by: SourcefireDespite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.
-
How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
Sponsored by: InfobloxUncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
-
Next-generation firewalls and your security strategy
Sponsored by: CiscoThis whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.
-
Cloud Endpoint Security: Considerations for Cloud Security Services
Sponsored by: Symantec CorporationThis E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
-
DNS Firewalls and Defense Tactics
Sponsored by: InfobloxGain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
-
Information Security Magazine - February 2013
Sponsored by: TechTarget SecurityIn this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.
-
E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?
Sponsored by: Dell SonicWALLUncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.
-
Bringing the Network Perimeter Back From the 'Dead'
Sponsored by: Symantec CorporationThere's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
-
E-Guide: Firewall Network Security: Thwarting Sophisticated Attacks
Sponsored by: Dell SonicWALLConsult this expert e-guide for a concise overview of the role that firewalls play in network security, as well as a description of the most sophisticated attack that a firewall can guard against. Discover the extent of firewall coverage by clicking through now.
-
Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
Sponsored by: Dell SonicWALLThis is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
-
Next Generation Firewalls: Assessing the Business/Technology Issue
Sponsored by: Dell SonicWALLIn the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.