ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Management Research

  • Malware Attacks Demand a New Malware Defense Approach

    Sponsored by: TechTarget Security

    Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!

  • How a next-generation firewall prevents application-layer attacks

    Sponsored by: TechTarget Security

    The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

  • Security as a Service: Benefits and Risks of Cloud-Based Security

    Sponsored by: TechTarget Security

    Uncover the fresh approach cloud-based Security as a Service (SaaS) is bringing to the market and learn the top benefits and risks to get help deciding if this is a viable option for your organization.

  • Mobile: The Technology Game-Changer in 2013

    Sponsored by: TechTarget Security

    TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.

  • Web Application Firewalls: Patching, SDLC Key for Security, Compliance

    Sponsored by: TechTarget Security

    In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.

  • September Information Security Magazine

    Sponsored by: TechTarget Security

    Industry experts explore key developments that define next-generation firewalls from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. Also uncover the latest global risk assessment that predicts investments in security will finally lead spending in years to come.

  • Next-Generation Firewalls (NGFWs)

    Sponsored by: AlgoSec

    This paper will highlight tips to effectively implement next-generation firewalls and optimize policies so that you can enjoy the clear benefits without falling into overly complex, unmanageable and risky policy traps.

  • Voice over IP (VoIP) Growth and the Strain on Network Security

    Sponsored by: WatchGuard Technologies, Inc.

    Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • Top 5 DNS Security Attack Risks and How to Avoid Them

    Sponsored by: Infoblox

    This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.

  • EGuide: Testing Enterprise Firewalls

    Sponsored by: Sophos

    In this expert guide from SearchSecurity.com, learn about the three types of firewall tests you should perform to ensure that the solution you end up selecting is the best for your organization's specific needs.

  • SIEM Demo: Get Complete Security Visibility in an Hour

    Sponsored by: AT&T Cybersecurity

    Watch a recorded 30-minute demo of AlienVault USM to see how you can get complete network security visibility in under an hour. During this technical session, you will get a detailed tour of our technology from one of our SIEM deployment experts. See the most popular features and use cases.

  • A CIO's Five-Point Plan for Managing Endpoint Security

    Sponsored by: Dell KACE

    Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.

  • Threat Prevention Techniques: Best Practices for Threat Management

    Sponsored by: GeoTrust, Inc.

    SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business.

  • Next-Generation IPS for Dummies

    Sponsored by: Sourcefire

    Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.

  • How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware

    Sponsored by: Infoblox

    Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.

  • Next-generation firewalls and your security strategy

    Sponsored by: Cisco

    This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.

  • Cloud Endpoint Security: Considerations for Cloud Security Services

    Sponsored by: Symantec Corporation

    This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!

  • DNS Firewalls and Defense Tactics

    Sponsored by: Infoblox

    Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.

  • Information Security Magazine - February 2013

    Sponsored by: TechTarget Security

    In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.

  • E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?

    Sponsored by: Dell SonicWALL

    Uncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.

  • Bringing the Network Perimeter Back From the 'Dead'

    Sponsored by: Symantec Corporation

    There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.

  • E-Guide: Firewall Network Security: Thwarting Sophisticated Attacks

    Sponsored by: Dell SonicWALL

    Consult this expert e-guide for a concise overview of the role that firewalls play in network security, as well as a description of the most sophisticated attack that a firewall can guard against. Discover the extent of firewall coverage by clicking through now.

  • Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs

    Sponsored by: Dell SonicWALL

    This is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.

  • Next Generation Firewalls: Assessing the Business/Technology Issue

    Sponsored by: Dell SonicWALL

    In the first of SearchSecurity.com's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.