ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Security Appliances Research

  • Thwarting Sophisticated Attacks with Today’s Firewalls

    Sponsored by: TechTarget Security

    This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).

  • Web application firewalls: How they can help protect customers

    Sponsored by: Astaro

    In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.

  • Next-generation firewalls are mainstream: What to expect

    Sponsored by: Palo Alto Networks

    Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.

  • Understanding the Value behind Enterprise Application-Aware Firewalls

    Sponsored by: Dell SonicWALL

    This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.

  • iSensor specifications

    Sponsored by: DellEMC and Intel®

    Organizations need advanced security technology, strong security expertise and 24x7 vigilance to safeguard their networks and IT systems. This data sheet offers an overview and specifications of Dell SecureWorks’ proprietary network intrusion prevention appliance, iSensor. Learn about its key features and how it can protect your networks.

  • E-Book: Technical Guide on Network Security Monitoring

    Sponsored by: TechTarget Security

    SearchMidmarketSecurity.com presents a comprehensive guide to network security monitoring. Our experts cover all the angles with authoritative technical advice on: network security management; integrity monitoring; security device testing; intrusion prevention buying criteria; and how to prepare for your annual network audit.

  • Corporate networks: Business 2.0 and beyond

    Sponsored by: SonicWALL

    The performance and security needs of corporate networks have evolved greatly in the last five years. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and affordability are now the key factors in network decision-making. Read on to learn more.

  • Vault-Like Protection for 200 Financial Services Locations

    Sponsored by: WatchGuard Technologies, Inc.

    Southern Management Corporation, a financial services company providing tax and loan services, required a tight lockdown of their cache of personal and confidential customer data, while allowing for easy administration from the small IT staff managing a widespread network. WatchGuard provided the perfect solution. Read on to learn how they did it

  • Practical Advantages of Fireware® XTM for Hands-On IT Administrators

    Sponsored by: WatchGuard Technologies, Inc.

    Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.

  • Symantec Protection Suite Challenge

    Sponsored by: Symantec Corporation

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs

    Sponsored by: SonicWALL

    This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.

  • Deploying Firewalls throughout Your Organization

    Sponsored by: Cisco Systems, Inc.

    Firewall filtering at multiple internal and external network perimeters helps prevent unauthorized access to critical business information.

  • Best Practices for Deploying LAN Security and NAC

    Sponsored by: Nevis Networks

    Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.

  • Encompass Writes New Prescription for Security with Check Point

    Sponsored by: Check Point Software Technologies Ltd.

    Encompass Medical Group found a turnkey HIPAA comliant Internet security solution by installing VPN-1 SmallOffice from Check Point Software.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.