ComputerWeekly.com Research Library

Powered by Bitpipe.com

Firewall Server Software Research

  • 4 Key Elements Of An ML-Powered NGFW: How Machine Learning Is Disrupting Network Security

    Sponsored by: Palo Alto Networks

    Bad actors and security teams are trading blows when it comes to leveraging automation, with both sides scaling their operations. But as more and more organizations leverage cloud, environments become more complex and more vulnerable. Delve into this white paper to learn how machine learning (ML) can aid in securing your network.

  • Pioneering DIY retailer future proofs SD-WAN security.

    Sponsored by: Barracuda

    Organizations looking to migrate firewall security, simplify network management, improve visibility, enhance connectivity and regulate traffic would gain much valuable information from this case study. It details a DIY retail chain that faced these challenges and how they were able to overcome them through upgrading their security architecture.

  • Dutch Insurance Provider Deploys Barracuda Firewalls from Data Unit

    Sponsored by: Barracuda

    Aevitae, a leading Dutch insurance provider company, was not satisfied with any of their existing firewalls solutions. They sought a solution that would provide seamless, end-to-end data visibility across their hybrid environment. In this case study, learn why Aevitae ultimately decided to partner with Barracuda Networks.

  • Barracuda SD-Wan Zero Touch Deployment

    Sponsored by: Barracuda

    Tune into this video for a brief walkthrough of how to use Barracuda CloudGen Firewall to deploy SD-WAN.

  • Barracuda CloudGen Firewall Savings Calculator

    Sponsored by: Barracuda

    How could your business benefit from a cloud-based firewall that includes protection against advanced persistent threats with full SD-WAN, link balancing, and WAN Optimization discipline? Find out by using the following cost and savings calculator for Barracuda's CloudGen Firewall.

  • E-Guide: Configure Outbound Firewall Rules for Data Protection

    Sponsored by: SearchSecurity.com

    A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.

  • E-Book: Technical Guide on Web Application Firewalls

    Sponsored by: SearchSecurity.com

    Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.

  • Putting Network Security Into Context

    Sponsored by: SearchNetworking.com

    Today's advanced threats demand a network security strategy that can adjust policies based on contextual data about users and apps. The technology is there to achieve this, but does your team have the skills and resources necessary to configure and maintain it? Access this handbook now to find out.

  • Getting the Most out of your NextGen Firewall

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.

  • Achieve Deeper Network Security and Application Control

    Sponsored by: DellEMC and Intel®

    Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.

  • Next-Generation Firewalls (NGFWs)

    Sponsored by: AlgoSec

    This paper will highlight tips to effectively implement next-generation firewalls and optimize policies so that you can enjoy the clear benefits without falling into overly complex, unmanageable and risky policy traps.

  • SuperMassive Series data sheet

    Sponsored by: Dell Software

    The Dell™ SonicWALL™ SuperMassive™ Series is Dell's Next-Generation Firewall (NGFW) platform designed for large networks to deliver scalability, reliability and deep security at multi-gigabit speeds with near zero latency.

  • Closing the Back Door on Network Application Vulnerabilities

    Sponsored by: Sophos

    This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.

  • Palo Alto Networks in the Data Center: Eliminating Compromise

    Sponsored by: Palo Alto Networks

    This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.

  • Intrusion Defense Firewall: Network-Level HIPS at the Endpoint

    Sponsored by: Trend Micro, Inc.

    This white paper examines a blended approach to host intrusion defense in search optimal security combined with an ideal balance between flexibility, control, and ease of management. Specific examples highlight the benefits and pitfalls of the many different filtering techniques.

  • Understanding Why Web Application Security is Critical to Business

    Sponsored by: Sirius Computer Solutions

    This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.

  • Firewall Solutions for Small Business

    Sponsored by: Cisco Systems, Inc.

    The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.

  • Symantec Endpoint Protection 11.0.3

    Sponsored by: Symantec Corporation

    In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.

  • Advancing the Economics of Networking

    Sponsored by: Juniper Networks, Inc.

    Download this white paper to find out how you can change this economic model and reduce capital and operational expenses, freeing up IT budget dollars and allowing your business to invest in innovative technologies that will reduce the cost of doing business while improving the bottom line.

  • 802.1X: Port-Based Authentication Standard for Network Access Control (NAC)

    Sponsored by: Juniper Networks, Inc.

    This white paper will help you discover how to implement secure wireless LAN access (WLAN) across the enterprise network.

  • Cisco ASA 5500 Series Business Edition Solution

    Sponsored by: Cisco Systems, Inc.

    The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected.

  • Network Firewalls

    Sponsored by: Information Security Magazine

    Cisco has been in business for more than 20 years and is emerging as a security powerhouse to be reckoned with, especially as security merges more with network operations in the enterprise.

  • Internet Security and Acceleration Server 2006

    Sponsored by: Microsoft

    ISA Server 2006 from Microsoft helps protect your IT environment from Internet-based threats while providing your users with fast and secure remote access to applications and data.

  • Encompass Writes New Prescription for Security with Check Point

    Sponsored by: Check Point Software Technologies Ltd.

    Encompass Medical Group found a turnkey HIPAA comliant Internet security solution by installing VPN-1 SmallOffice from Check Point Software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences