firewall

Results 176 - 200 of 408Sort Results By: Published Date | Title | Company Name

Understanding Web Application Security Challenges

Published By: IBM     Published Date: Aug 21, 2008
As businesses grow increasingly dependent upon Web applications, these complex entities are becoming more difficult to secure. Most companies equip their Web sites with firewalls, Secure Sockets Layer (SSL), and network and host security, but the majority of attacks are on applications themselves.
Tags : 
application security, web security, ibm, ibm mi, ibm grm, security, internet security, intrusion prevention
    
IBM

Enable innovation with collaboration, without boundaries

Published By: IBM     Published Date: Jan 12, 2009
In today's competitive environment, sharing information and expertise can be critical in driving organizational success. To foster innovation, it's important to create collaboration communities of employees, as well as customers and partners "outside the firewall." Read this white paper to learn how to tap into both internal and external knowledge.
Tags : 
ibm, collaboration communities, tapping internal knowledge, innovation at workplace, collective knowledge, collaboration through communication, networking, knowledge management
    
IBM

Responding to and Recovering From Sophisticated Security Attacks

Published By: IBM     Published Date: Sep 09, 2013
Learn IBM's 4 free tips that will help keep your organization safe
Tags : 
security attacks, ibm, apt, firewall, data, networks, infrastructure, application security
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

Can We Say Next-Gen Yet? State Of Endpoint Security - SANS Report

Published By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM

IBM Security: Integrated Threat Protection System for Dummies 2017

Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM

How to get the benefits of cloud behind your firewall

Published By: IBM APAC     Published Date: Nov 13, 2018
Learn how IBM Cloud Private provides a common and consistent platform for enterprises to rapidly innovate while retaining the flexibility to use public clouds and services.
Tags : 
    
IBM APAC

The Social Marketplace: Extend Collaboration, Knowledge Sharing & Networking to Customers

Published By: IGLOO Software     Published Date: Dec 29, 2009
Networked business models are the wave of the future as we extend collaboration, knowledge sharing and networking beyond the corporate firewall to customers, partners and suppliers. Focusing resources on optimizing your relationships with these stakeholders can make you more resilient and adaptive to shifts in the market.
Tags : 
social marketplace, igloo, collaboration, facebook, linkedin, twitter, web 2.0, loyalty
    
IGLOO Software

Cutting the Cost of Application Security

Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending
    
Imperva

What Next Generation Firewalls Miss: 6 Requirements to Protect Web Applications

Published By: Imperva     Published Date: Nov 07, 2013
This white paper outlines the application threat landscape; explains why next generation firewalls are ill-equipped to stop web attacks; and provides six essential requirements for protecting web applications.
Tags : 
imperva, web applications, web application security, ddos, web attack, data protection, firewalls, next gen firewalls
    
Imperva

Private Cloud Without Network Automation - Can It Be done?

Published By: Infoblox     Published Date: Jun 11, 2012
The dynamic nature of virtual and private cloud environments cannot be accommodated by an underlying infrastructure that is a static, physical assembly of routers, switches, servers, and firewalls. Find out more in this complimentary white paper
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls
    
Infoblox

Ensuring Business Continuity Through IPv6 Adoption. What To Do Now and What Can Wait

Published By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls
    
Infoblox

Defeating Advanced Persistent Threat Malware

Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Protecting Your Enterprise Network

Published By: Infoblox     Published Date: Sep 04, 2013
Security challenges, costs & solutions for IT practitioners
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Are Your DNS Servers as Secure and Available as the Rest of Your Network?

Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

A Cybercriminal’s Guide to Exploiting DNS for Fun and Profit

Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Protecting DNS Infrastructure—Inside and Out

Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Designing a Secure DNS Architecture

Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Designing a Secure DNS Architecture

Published By: Infoblox     Published Date: Jun 18, 2015
Download this white paper and find out how you can turn your biggest vulnerability into a key layer of your network security defense.
Tags : 
infoblox, network security, dns based attacks, next generation firewalls, malware attacks, dns servers, dns infrastructure, internal attacks
    
Infoblox

Solving the Firewall/NAT Traversal Issue of SIP

Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony
    
Ingate Systems

Collaboration for Modern Workplaces

Published By: Intel     Published Date: Jul 17, 2019
Today, business is conducted in a fast-paced, on-demand, globally dispersed environment. Maintaining a competitive edge requires cohesive real-time collaboration. Mobile workers, partners, vendors, suppliers, and even customers expect to be able to work together seamlessly, both inside and outside the firewall. But delivering tools for high-quality collaboration is often challenging, due to the need for businesses of all sizes to support a wide range of personal and business devices. Mixing disparate devices with complex conferencing solutions often lead to frustrated employees, while businesses face a labor-intensive, costly endeavor without a high ROI. In addition, collaboration is evolving with businesses creating small "huddle" spaces and open workspaces that increase the demand for ubiquitous, effective conferencing. The Intel Unite ' solution is a fast, simple, cost-efficient way to deliver a more secure, manageable, high-quality collaboration experience. Whether you select the
Tags : 
    
Intel

The Security Industry’s Dirty Little Secret - The debate over advanced evasion techniques (AETs)

Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt
    
Intel Security

Advanced Evasion Techniques for Dummies

Published By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
    
Intel Security

Industry Experts Speak Out: The Network Performance and Security Trade-Off

Published By: Intel Security     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security. Nearly half of IT professionals report they continue to make this tradeoff, and if you believe our experts, that number is being under-reported based on what they’re seeing.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, security
    
Intel Security

Is Your Next Generation Firewall Plug and Play Ready?

Published By: Intel Security     Published Date: Jan 20, 2015
Companies of all sizes with multiple remote locations can benefit from plug-and-play next-generation firewalls. Traditional methods can take a long time to implement and can prove expensive. With plug-and-play deployments, on the other hand, you save money, conserve resources, reduce the likelihood of errors, and get single-pane-of-glass centralized management.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
Intel Security
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.