firewall

Results 76 - 100 of 410Sort Results By: Published Date | Title | Company Name

4 Common Questions Asked of Our Security and Risk Consultants

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
The SecureWorks Security and Risk Consulting practice provides expertise and analysis to help you enhance your security posture, reduce your risk, facilitate compliance and improve your operational efficiency.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

Technical Testing - Which Assessment is Right for Me

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Technical Tests are designed to cover specific services. Each security test has its own objectives and acceptable levels of risk. There is not an individual technique that provides a comprehensive picture of an organisation’s security when executed alone. A qualified third party can work with you to determine what combination of techniques you should use to evaluate your security posture and controls to begin to determine where you may be vulnerable.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

What GDPR Means for your Security Strategy Understanding the implications for your organisation

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
GDPR will pose different challenges to each organisation. Understanding and acting on the implications for your own organisation is vital. That means taking a risk-based approach to ensure that you are doing what you need to do to manage your own specific risks to personal information. While virtually all organisations will have to implement changes to become GDPR compliant, some will be able to take partial advantage of existing compliance to other security mandates and frameworks, such as ISO 27001 and PCI by extending those measures to protection of personal data. Even so, further work will be required to comply with GDPR, both with regards to security and its other aspects.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

Nines Steps to Smart Security for Small Businesses

Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus, anti spam, anti spyware
    
Qualys

PCI Compliance for Dummies

Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection, anti spyware, anti virus
    
Qualys

Detect malicious patterns in encrypted traffic.

Published By: Cisco     Published Date: Oct 08, 2018
Detect attacks that get past perimeter defenses across the digital business. Detect malicious patterns in encrypted traffic. No decryption is needed with our Encrypted Traffic Analytics technology and multilayer machine learning. Extend your network visibility.
Tags : 
encrypted traffic, digital business, security, network, network visibility, next generation firewall, digital transformation, advanced malware protection
    
Cisco

Why You Need a Next-Generation Firewall

Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn why you need to embrace next-generation firewalls to stay ahead of the newest threats to IT with this whitepaper from HP
Tags : 
next generation firewall, firewall, next-gen, whitepaper, cloud computing, virtualization, mobility, application security
    
HP - Enterprise

Application Security in the Cloud

Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall, mobile computing, application performance management, business technology
    
F5 Networks Inc

Guide to Microsoft Exchange Security Solutions

Published By: F5 Networks Inc     Published Date: Oct 19, 2012
The demand for access to email anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn why a service-oriented security perimeter improves security for Exchange.
Tags : 
microsoft exchange, exchange security, email security, email availability, exchange availability, secure exchange access, remote access to exchange, application security
    
F5 Networks Inc

Solution Brief: Top 5 Largest Malware Delivery Networks

Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
Blue Coat Systems UK

5 Schritte zur Planung Einer Firewall

Published By: Juniper Networks     Published Date: Jan 11, 2016
Unsere Anleitung mit fünf Schritten zur Firewall-Planung bietet Ihnen eine Zusammenfassung zur Gestaltung der Netzwerk-Firewall. Sie enthält außerdem Links zu noch detaillierteren Websites und Veröffentlichungen zu diesem Thema. Wenn Sie die Firewall-Architektur für Ihr Unternehmen gestalten, sollten Sie zunächst diesen Text lesen.
Tags : 
    
Juniper Networks

SCHÜTZEN SIE IHR UNTERNEHMEN MIT EINER FIREWALL DER NÄCHSTEN GENERATION

Published By: Juniper Networks     Published Date: Jan 11, 2016
Erfahren Sie, wie Sie Ihr Netzwerk heute und in Zukunft schützen können. Lesen Sie unsere Broschüre und entdecken Sie, wie Sie sich dank der Firewall der nächsten Generation vor inhalts- und anwendungsbasierten Bedrohungen schützen, die Bandbreite verwalten und die Komplexität herunterschrauben können.
Tags : 
    
Juniper Networks

Windows 10 Security and VMware AirWatch

Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch

Más allá de la visibilidad y el control de las aplicaciones: Cómo debe ser un NGFW

Published By: Cisco     Published Date: Apr 11, 2016
Las redes modernas y sus componentes evolucionan constantemente y los firewalls de próxima generación tradicionales no pueden proporcionar el nivel de protección que necesitan las organizaciones.
Tags : 
    
Cisco

Improving Web Application Security: The Akamai Approach to WAF

Published By: Akamai Technologies     Published Date: Mar 10, 2016
The web application firewall (WAF) is among the most complex security technologies on the market today. The complexity of managing a WAF includes a pre-defined list of rules to identify thousands of potential exploits, intelligence about new attack vectors, and identifying malicious HTTP requests from legitimate HTTP traffic. Read this white paper to learn how to combine attack detection with threat intelligence using our cloud platform and managed security services to better protect your web applications.
Tags : 
akamai technology, web application security, http, best practices, security, risk management
    
Akamai Technologies

Defending Against Black Nurse DoS Attacks

Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks vSRX Virtual Firewall vs. the Competition
Tags : 
    
Juniper Networks

Securing Enterprise Hybrid Clouds

Published By: Juniper Networks     Published Date: Aug 21, 2017
High-performance, space-efficient, next-generation firewalls defend enterprise hybrid cloud infrastructure
Tags : 
    
Juniper Networks

The Network Leaders’ Guide to Secure SD-WAN

Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA

Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon

University of South Florida Secures Big Data with Dell SonicWALL

Published By: Dell & Microsoft     Published Date: Jul 10, 2013
USF Pediatric Epidemiology Center boosts network security performance 10-fold, while saving $100,000 with SuperMassive Next-Gen Firewall
Tags : 
usf, dell sonicwall, big data, network security
    
Dell & Microsoft

Technical Brief – Secondary/Multi DNS patterns

Published By: Oracle     Published Date: Jul 05, 2017
Improve the performance, security and reliability of your DNS infrastructure by adding a supplemental DNS service to your IT environment. Best-of-breed managed DNS service providers have the global DNS infrastructure and deep DNS network operations expertise to ensure your success. Adding a secondary DNS service can help you deliver consistent, high-quality user experiences across the world and mitigate outage risk. To learn more read our white paper: High Availability DNS Reduces Downtime Risk and Improves End-User Experience
Tags : 
dns, service, serve traffic, corporate firewall, service features, api daemon
    
Oracle

Understanding And Mitigating DDOS Attacks

Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle

Understanding And Mitigating DDOS Attacks

Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn

Get the most from the move to a next-generation firewall - FR

Published By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : 
ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware
    
McAfee

Get the most from the move to a next-generation firewall - DE

Published By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : 
ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.