ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Management Research

  • E-Guide: Shortcut guide to Web application firewall deployment

    Sponsored by: TechTarget Security

    Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.

  • E-Guide: Using web application firewalls to ease compliance efforts

    Sponsored by: TechTarget Security

    When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.

  • Expert E-Book: Data Security and the Cloud

    Sponsored by: TechTarget Security

    This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.

  • E-Book: Technical Guide on Web Application Firewalls

    Sponsored by: TechTarget Security

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

  • Increasing Security Throughput with Palo Alto Networks & Brocade

    Sponsored by: Copper River IT

    The growing volume of information entering and leaving a data center often exceeds a single network's capacity. Read this white paper to learn how you can maintain data center speeds without sacrificing your security.

  • 2012 - Endpoint Security Best Practices Survey

    Sponsored by: Symantec Corporation

    Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.

  • Webroot Secure Anywhere - Endpoint Protection

    Sponsored by: OpenText Security Solutions

    Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.

  • Closing the Back Door on Network Application Vulnerabilities

    Sponsored by: Sophos

    This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.

  • Palo Alto Networks in the Data Center: Eliminating Compromise

    Sponsored by: Palo Alto Networks

    This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.

  • Protecting your Network and Data Center with Next-Gen Firewalls

    Sponsored by: Palo Alto Networks

    Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs.

  • Web application firewalls: How they can help protect customers

    Sponsored by: Astaro

    In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.

  • Network Evolution E-Zine: Network security in a world of mobile workers

    Sponsored by: TechTarget Networking

    In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.

  • Next-generation firewalls are mainstream: What to expect

    Sponsored by: Palo Alto Networks

    Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.

  • Application-Aware Firewalls

    Sponsored by: Juniper Networks, Inc.

    This IT Checklist outlines the capabilities application-aware firewalls can and should have. It also can guide you to discover the criteria your firewall should have to meet your security needs.

  • Presentation Transcript: The New Branch Office - Simply Connected

    Sponsored by: Juniper Networks, Inc.

    This is a presentation transcript of a webcast dedicated to learning about branch offices: the challenges, solutions, and how to keep them secure.

  • Social Business in the Cloud

    Sponsored by: IBM

    Deepen your customer relationships. Drive operational effectiveness. Optimize your workforce. Read this white paper and see how using LotusLive services to become a social business can help your organization simplify, speed up and enhance interactions in practically all areas of the business.

  • Five Critical Rules for Firewall Management

    Sponsored by: Dell SecureWorks

    This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.

  • The New Status Quo: Zero-Day and Targeted APT Attacks

    Sponsored by: FireEye

    During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.

  • Backup Mobile and Remote Users Securely, With or Without a VPN

    Sponsored by: Copiun

    This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.

  • Key Considerations for Adopting Infrastructure as a Service (IaaS)

    Sponsored by: Dell Software

    In this expert e-guide, find answers to four key Web application security questions. Also discover best practices for application-level firewall selection and deployment.

  • E-Guide: Why attackers exploit multiple zero-day attacks and how to respond

    Sponsored by: ESET

    The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.

  • SonicWALL PCI Compliance Solution Brief

    Sponsored by: SonicWALL

    The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.

  • Backup Mobile and Remote Users Securely, With or Without a VPN

    Sponsored by: Copiun

    This whitepaper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.

  • Top 10 Tips to Keep Your Small Business Safe

    Sponsored by: Trend Micro, Inc.

    Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.

  • Take Back Control: Increase Security, Empower Employees, Protect the Business

    Sponsored by: WatchGuard Technologies, Inc.

    Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.