firewall

Results 326 - 350 of 411Sort Results By: Published Date | Title | Company Name

Build Security into your Datacenter with Red Hat Enterprise Linux

Published By: Red Hat     Published Date: Jan 01, 2013
Traditional security measures such as network firewalls are no longer enough to keep an enterprise secure. With Red Hat Enterprise Linux, security mechanisms are incorporated and applied at the core of every solution, and security is extended to include all the open source packages that make up Red Hat Enterprise Linux. As a result, customers experience a higher quality of service.
Tags : 
red hat, security systems, server operating system, next-generation datacenters, enterprise linux, security innovation, evade network defenses, dynamic datacenters, virtualization technologies, cloud computing practices, security, data center
    
Red Hat

Endpoint Buyers Guide

Published By: Sophos     Published Date: Dec 17, 2012
It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets.
Tags : 
endpoint, antivirus, anti-spyware, firewall, endpoint security, data loss prevention, security
    
Sophos

Threats of Social Media

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
According to Time, as much as 40% of social network users are exposed to some form of malware.
Tags : 
firewall, security, social media, threats, web2.0, consumerization, byod, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management, business technology
    
Dell SonicWALL

IT Security Trends in 2013

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
Dell™ SonicWALL™ thought leaders identify top IT security drivers for the year ahead.
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management, application intelligence, whitepaper, cloud, byod, enterprise, security, it management, anti spam, anti spyware
    
Dell SonicWALL

New Set of Network Security Challenges

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
A new IDG survey reveals optimism about the ability of next- generation firewalls to help IT balance productivity and security.
Tags : 
firewall security, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management, application intelligence, whitepaper, mobile, social, tablets, byod, security, anti spam, anti spyware, anti virus, hacker detection, internet security
    
Dell SonicWALL

Advanced Targeted Attacks: How to protect against the next generation of cyber attacks

Published By: FireEye     Published Date: Nov 27, 2012
How to Protect Against the Next Generation of Cyber Attacks
Tags : 
fireeye, cyber attacks, firewalls, ips, protect, security, business technology
    
FireEye

Application Security in the Cloud

Published By: F5 Networks Inc     Published Date: Oct 19, 2012
Whether critical applications live in the cloud, in the data center, or both, organizations need a point of control for application security. Learn how you can achieve the security, intelligence, and performance that today's infrastructure demands.
Tags : 
cloud security, securing applications in the cloud, securing data in the cloud, secure web applications, web application firewall, mobile computing, application performance management, business technology, cloud computing
    
F5 Networks Inc

Guide to Microsoft Exchange Security Solutions

Published By: F5 Networks Inc     Published Date: Oct 19, 2012
The demand for access to email anywhere, from any device makes it critical for IT to ensure Microsoft Exchange deployments are secure, fast, and available. Learn why a service-oriented security perimeter improves security for Exchange.
Tags : 
microsoft exchange, exchange security, email security, email availability, exchange availability, secure exchange access, remote access to exchange, application security, preventing application attacks, application-layer attacks, application firewall, web application firewall, security, data management, business technology, cloud computing
    
F5 Networks Inc

Best Practices for Database Activity Monitoring and Blocking

Published By: Oracle Corp.     Published Date: Oct 15, 2012
Steve Moyle, CTO of Oracle Database Firewall, explains the best practices for efficient database activity monitoring, alerting and blocking that can help prevent SQL injection attacks and other threats from reaching your enterprise databases.
Tags : 
oracle, sql injection, database activity monitoring, database security, it security, compliance, security management, infrastructure
    
Oracle Corp.

Polycom® Recommended Best Security Practices for Unified Communications

Published By: Polycom     Published Date: Sep 04, 2012
This document describes the security issues that organizations should consider as they deploy UC, and offers Polycom's recommendations for implementing secured UC.
Tags : 
firewall traversal, polycom, unified communications, security solutions, uc devices
    
Polycom

HP Gen8 Client Virtualization Enterprise Reference Architecture for VMware View 5.1

Published By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
An increasingly global and mobile workforce is changing the way IT needs to support the business. Worker demographics are also changing, resulting in different expectations on how IT delivers data and applications. HP and VMware make this important move to Client Virtualization safe and easy by testing and developing the most popular solutions. On its sixth generation Client Virtualization reference architecture, HP tests many combinations of storage, networking, and blades to best handle the Client Virtualization workloads.
Tags : 
client virtualization, reference architecture, core design, client virtualization, active directory, local users, vdi, user data, outsourcing, work from home, branch, endpoint devices, firewall, vpn, stacking links, storage, data management, cloud computing, virtualization, infrastructure
    
HP and Intel® Xeon® processors

PCI Compliance for Dummies

Published By: Qualys     Published Date: Jul 19, 2012
Updated for PCI DSS Version 2.0 where internal scanning is now required! With the recent updates to PCI DSS, get all the facts and learn how to comply with our updated version of the book. The book is a guide to understanding how to protect cardholder data and comply with the requirements of PCI DSS. It arms you with the facts, in plain English, and shows you how to achieve PCI Compliance. Discover: . What the Payment Card Industry Data Security Standard (PCI DSS) is all about . The 12 Requirements of the PCI Standard . How to comply with PCI . 10 Best-Practices for PCI Compliance . How QualysGuard PCI simplifies PCI compliance
Tags : 
pci, technology, security, firewall, email, virus protection, anti spyware, anti virus, application security, email security, firewalls, internet security, business technology, research, data loss prevention
    
Qualys

Nines Steps to Smart Security for Small Businesses

Published By: Qualys     Published Date: Jul 19, 2012
Data breaches are bad for business, so every enterprise needs security. In the past this was expensive, because security products were designed for companies with deep pockets and teams of experts. But that's changed. New 'cloud based' services, such as those offered by Qualys, are fast to deploy, safe and easy to use. What's more they're even more affordable. With growing demands from customers and regulators for security, now is a good time to invest in security. Leading cloud-based security services deliver a professional level of security assurance in a form that fits the circumstances and pockets of small businesses.
Tags : 
technology, firewall, security, cloud, data, anti-virus, anti spam, anti spyware, anti virus, application security, disaster recovery, firewalls, business technology, research, data loss prevention
    
Qualys

Legacy Tools: Not Built for Today's Helpdesk

Published By: LogMeIn     Published Date: Jul 13, 2012
This paper explores the challenges of supporting a remote workforce with legacy tools and the hidden costs of these tools. In addition, it identifies best practices that decision makers can use to choose enterprise helpdesk support tools that better meet the needs of remote employees, while helping to cut costs.
Tags : 
helpdesk, mobility, remote workforce, corporate firewall, legacy support tools, cost-saving, it management, expense management, business technology
    
LogMeIn

Controlling Botnets with the Next-Generation Firewall

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Read this white paper to learn how botnets work and about the role of next-generation firewalls in controlling threats. Download now.
Tags : 
palo alto, botnets, firewall, malware, business technology
    
Palo Alto Networks

Eliminating Data Center Compromise With Next-Generation Firewalls

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Palo Alto Networks uniquely delivers on the network security demands found in both types of data center environments.
Tags : 
palo alto, enterprises, infrastructure, business technology
    
Palo Alto Networks

10 Things Your Next Firewall Must Do

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprise-focused, and distinct, many network security vendors are claiming NGFW is a subset of other functions.
Tags : 
    
Palo Alto Networks

2011-2012 Firewall Buyers Guide

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
The threats that enterprise network and security teams face are evolving rapidly, and the security products that they implement play a major role in the success or failure of the organization's overall security strategy.
Tags : 
firewall, 2011-2012, enterprise, network, security, business technology
    
Palo Alto Networks

NSS Labs Firewall Group Test

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Network Firewall Individual Test Result
Tags : 
nss labs, firewall, firewalls, business technology
    
Palo Alto Networks

Cutting the Cost of Application Security

Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending, firewalls, security management, return on investment, web service security, data protection, business technology
    
Imperva

Ensuring Business Continuity Through IPv6 Adoption. What To Do Now and What Can Wait

Published By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox

Private Cloud Without Network Automation - Can It Be done?

Published By: Infoblox     Published Date: Jun 11, 2012
The dynamic nature of virtual and private cloud environments cannot be accommodated by an underlying infrastructure that is a static, physical assembly of routers, switches, servers, and firewalls. Find out more in this complimentary white paper
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls, agilitytime, value, network, network automation, automation, tasks, productivity, configuration, infrastructure, enterprise, enterprise network, compliance
    
Infoblox

Securing the Cloud

Published By: F5 Networks Inc     Published Date: Apr 18, 2012
Cloud computing has become another key resource for IT deployments, but securing applications and data in the cloud remains a concern. Learn strategies for keeping your most precious assets safe, no matter where they reside.
Tags : 
cloud computing, cloud security, protection data in the cloud, cloud data protection, cloud deployment, application protection in the cloud, authentication, aaa, secure remote access, web application firewalls, application security, application integration, analytical applications, business technology
    
F5 Networks Inc
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.