firewall

Results 326 - 350 of 410Sort Results By: Published Date | Title | Company Name

Requirements When Considering a Next- Generation Firewall

Published By: Cisco     Published Date: Oct 14, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a next-generation firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise.
Tags : 
cisco, nfgw, next generation firewall, enterprise management, network visibility, malware activity, malware protection, security solutions, networking, security, software development, it management, data management, business technology
    
Cisco

Demand more from a next generation firewall to optimize your investment and network performance

Published By: McAfee     Published Date: Oct 10, 2013
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, network performance, network security, firewalls, internet security, business technology
    
McAfee

Advanced evasion techniques have changed the security landscape. Here’s help to evade them.

Published By: McAfee     Published Date: Nov 11, 2013
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, firewalls, hacker detection, intrusion detection, intrusion prevention, data protection
    
McAfee

NGFW Requirements for SMBs and Distributed Enterprises

Published By: Cisco     Published Date: Feb 16, 2016
The need for threat-focused next-generation firewalls (NGFWs) that can effectively mitigate risks that traditional unified threat management (UTM) and point solutions cannot is highlighted by numerous studies, including one from Cisco that reported that every organization should assume it has been hacked. Cisco threat researchers found malicious traffic was visible on 100 percent of the corporate networks that they observed, with evidence that adversaries had often penetrated those networks and were frequently operating undetected over a long period.
Tags : 
network security, threat management, network management, security, productivity
    
Cisco

Lenovo's 360° Approach to Security Available to You

Published By: Lenovo     Published Date: Aug 31, 2018
? Security threats are growing at an astronomical pace–theft, hacking, malware, ransomware... and the list goes on. That's why Lenovo integrates security at every level including built-in hardware, advanced software, a secure supply-chain, complete component validation and integrated services. In addition to Lenovo's own security features built into each device, Windows 10 Pro delivers comprehensive, built-in and ongoing security protections you can trust – including Windows Hello, Windows Defender Antivirus, firewall, and more. Read more in this comprehensive product guide, from personal device to data center, we'll show you how we're hard at work securing your devices from the threats.
Tags : 
    
Lenovo

Addressing User Data Risks In A Distributed Data World

Published By: Druva     Published Date: Mar 30, 2016
As information security continues to rise to the top of the enterprise priority list, what used to be an easy-to-control environment, with all data stored behind the corporate firewall, is no longer. Shadow IT, mobile computing, consumer IT, and cloud computing are all transforming enterprise IT. Workers using unsecured networks and devices without encryption are also a concern, as data breaches cost organizations millions of dollars in fines, data loss, investigations, and customer backlash.
Tags : 
druva, data risks, consumer it, corporate firewall, shadow it, mobile computing, data breaches, security
    
Druva

Network protection and UTM Buyers Guide

Published By: Sophos     Published Date: May 09, 2013
This buyers guide is designed to help you choose the right solution for your organization. It looks at the factors you should consider when evaluating solutions to ensure you have the protection and functionality you need, both now and as your business evolves.
Tags : 
network protection, sophos, buyers guide, security, application security, security software, firewall, vpn, scanning, spam, network performance, network security, anti spam, anti spyware, anti virus, firewalls, hacker detection, intrusion detection, intrusion prevention, data protection
    
Sophos

Cisco Metapod

Published By: Cisco     Published Date: Jan 05, 2016
As software continues to ‘eat the world’ in today’s app economy, companies need to adapt to changing business models, globalization, and increasing regulatory compliance. Under pressure to support strategic business objectives, IT is rapidly embracing cloud technologies. Cloud adoption has steadily gained acceptance because it promises to help you achieve your business goals faster, more efficiently, and more cost effectively. Cisco Metapod™ is an excellent solution to some of your organization’s biggest business and technology challenges. This infrastructure-as-a-service (IaaS) offer delivers a reliable and programmable infrastructure for your application development and operation teams while providing a public cloud experience behind your firewall, on your premises, and with full remote management.
Tags : 
    
Cisco

Cisco Metapod

Published By: Cisco     Published Date: Apr 15, 2016
As software continues to ‘eat the world’ in today’s app economy, companies need to adapt to changing business models, globalization, and increasing regulatory compliance. Under pressure to support strategic business objectives, IT is rapidly embracing cloud technologies. Cloud adoption has steadily gained acceptance because it promises to help you achieve your business goals faster, more efficiently, and more cost effectively. Cisco Metapod™ is an excellent solution to some of your organization’s biggest business and technology challenges. This infrastructure-as-a-service (IaaS) offer delivers a reliable and programmable infrastructure for your application development and operation teams while providing a public cloud experience behind your firewall, on your premises, and with full remote management.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, network management, best practices, content delivery, cloud computing
    
Cisco

You Can’t Control It,But You Can Protect it:Enabling Security for Cloud, Mobile, Social Applications

Published By: Rapid7     Published Date: Mar 19, 2014
This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.
Tags : 
rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection, network security, firewalls, intrusion prevention, data protection, vulnerability management, mobile device management, data loss prevention
    
Rapid7

5 Steps to Firewall Planning and Design

Published By: Juniper Networks     Published Date: Feb 18, 2015
The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed list of useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.
Tags : 
firewall planning, network firewall, security policy, http, terminal server, network, email security, firewalls, data protection
    
Juniper Networks

Next-Generation Firewalls: Control Your Network. Protect Your Business Assets.

Published By: Juniper Networks     Published Date: Feb 18, 2015
Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.
Tags : 
firewall, network, business assets, security, management, network security, firewalls, security management, data protection, database security
    
Juniper Networks

Astaro Outperforms Cisco as an Integrated Security Solution at Devine Millimet

Published By: Astaro     Published Date: Aug 10, 2009
The Cisco PIX firewall appliance at Devine Millimet, Attorneys at Law, needed replacement.
Tags : 
astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine millimet, failover, ssl, vpn, intrusion, web filtering, anti-malware, security, anti spyware, intrusion detection, intrusion prevention
    
Astaro

Astaro Receives an "A" at Fowlerville Community School for Blocking Inappropriate Materials

Published By: Astaro     Published Date: Aug 10, 2009
The Fowlerville Community Schools, a K-12 institution, has all the regular security needs of an educational institution.
Tags : 
inappropriate web content, internet usage, download, music, movies, content filtering, astaro, filter, security gateway, internet security, internet, firewall, proxy, security, vpn, firewalls
    
Astaro

Why the City of Lake Wales (Florida) Selected Astaro Security Gateway over Cisco-Pix

Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro

Astaro Replaces Cisco and Barracuda for Better Security Management at Frontier Nursing Service

Published By: Astaro     Published Date: Aug 10, 2009
Frontier Nursing Services (FNS, Inc.) of Hyden, Kentucky provides health care to the underserved population in rural areas of southeast Kentucky and is committed to advancing nursing through education.
Tags : 
frontier nursing, astaro, cisco, barracuda, pix, fns, network, it department, management, reporting, all-in-one security, vpn, firewall, email, antivirus, gateway, report manager, security, anti virus, firewalls
    
Astaro

Preparing for the 2.0 World: How Enterprises Need to Think About Emergent Social Technologies

Published By: Sun Microsystems     Published Date: Jul 20, 2009
This free white paper from the experts at IDC reveals the profound impact of social technologies-also known as Web 2.0-on enterprise IT. Users are demanding capabilities including collaboratively working across regions, knowledge capture, and community and brand building outside the firewall. But you can meet those demands-if you're ready.
Tags : 
web 2.0, sun, social technologies, enterprise it, collaboration, virtualization, sun microsystems, power, cooling, business integration, business intelligence, customer interaction service, enterprise software, information management
    
Sun Microsystems

Why Anti-DDoS Products and Services are Critical for Today’s Business Environment

Published By: Arbor Networks     Published Date: Jan 31, 2013
This paper will look at DDoS attacks in detail. It will illustrate the attack vectors being used and describe why the threat to organizations is greater than ever before
Tags : 
anti-ddos, products, services, critical, business environment, ips devices, firewall, arbor network, security, knowledge management, data management, business technology, data center
    
Arbor Networks

Why Firewalls and Intrusion Prevention Systems (IPS) Fall Short on DDoS Protection

Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks, security, it management, data management, business technology, data center
    
Arbor Networks

Firewall and IPS Design Guide

Published By: Cisco     Published Date: Aug 18, 2014
Optimize benefits from your Cisco ASA 5500-X Series Next-Generation Firewall, and better secure your network from malicious activity, with a proven firewall and IPS design guide. Use this guide for faster, more reliable, and more predictable deployment.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network, vulnerabilities, firewall, optimize, security, web service security, productivity
    
Cisco

Top 10 Considerations When Buying a Next-Generation Firewall

Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security, visibility, management, support, migration, services, applications, improve, proactive, protection, data management
    
Cisco

Next-Generation Network Security: A Buyers’ Guide

Published By: Cisco     Published Date: Jan 15, 2015
Today’s adversaries continue to increase their capabilities faster than the defenses deployed to stop them. Whether they are obfuscating their attacks or hiding malicious code within webpages and other files, they are making it more and more difficult to profile and identify legitimate network traffic. This is especially true in firstgeneration network security devices that restrict protection and policies to ports and protocols.
Tags : 
firewall, buyers guide, protocols, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, it management, data management
    
Cisco

Integrated Network Security Architecture: Threat-Focused Next-Generation Firewall

Published By: Cisco     Published Date: Jan 15, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, it management
    
Cisco

Next Generation Firewall (NGFW) Security Value Map

Published By: Cisco     Published Date: Jan 15, 2015
Empirical data from our individual Product Analysis Reports (PARs) and Comparative Analysis Reports (CARs) is used to create the unique Security Value MapTM (SVM). The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
comparitive analysis, datacenter, social, analytics, security, data management
    
Cisco

Requirements When Considering a Next-Generation Firewall

Published By: Cisco     Published Date: Jan 15, 2015
The current evolution of computing is prompting enterprise datacenters and their associated networks to adopt new approaches. The four pillars of computing — cloud, mobility, social, and analytics — are now the key trends driving new levels of network innovation that will determine the design and operation of datacenter networks over the next several years.
Tags : 
firewall, next generation, networks, computing, cloud, innovation, enterprise, datacenter, social, analytics, security, enterprise applications
    
Cisco
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.