firewall

Results 201 - 225 of 411Sort Results By: Published Date | Title | Company Name

Is Your Next Generation Firewall Plug and Play Ready?

Published By: McAfee     Published Date: Jan 20, 2015
When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
McAfee

Is Your Next Generation Firewall Plug and Play Ready?

Published By: Intel Security     Published Date: Jan 20, 2015
Companies of all sizes with multiple remote locations can benefit from plug-and-play next-generation firewalls. Traditional methods can take a long time to implement and can prove expensive. With plug-and-play deployments, on the other hand, you save money, conserve resources, reduce the likelihood of errors, and get single-pane-of-glass centralized management.
Tags : 
plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
Intel Security

Is Your Next-Generation Firewall Plug-and-Play Ready?

Published By: McAfee     Published Date: Sep 15, 2014
Quick-to-deploy protection for remote locations.
Tags : 
firewall, firewall protection, it security, intrusion prevention systems
    
McAfee

IT Security Trends in 2013

Published By: Dell SonicWALL     Published Date: Nov 28, 2012
Dell™ SonicWALL™ thought leaders identify top IT security drivers for the year ahead.
Tags : 
firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
    
Dell SonicWALL

IT security, un fattore di crescita pensato per il lungo periodo

Published By: Cisco EMEA     Published Date: May 15, 2018
Il Gruppo Marcegaglia conferma una strategia di sicurezza IT basata su soluzioni Cisco che va dagli strumenti di firewall al sistema di Next-Generation Intrusion Prevention System passando per la gestione centralizzata. Il Gruppo Marcegaglia è la realtà industriale leader mondiale nella trasformazione dell’acciaio che opera dall’Italia a livello globale, con una presenza di 43 stabilimenti distribuiti su una superficie complessiva di 6 milioni di metri quadrati. Fanno parte del Gruppo 7.000 dipendenti, 60 unità e 210 rappresentanze commerciali per un fatturato che, nel 2013, è stato di oltre 4 miliardi di euro nel settore dell’acciaio e diversificate. Il tutto grazie alla produzione quotidiana di 5.500 chilometri di manufatti in acciaio inossidabile e al carbonio per oltre 15.000 clienti, per un totale di oltre 5 milioni di tonnellate lavorate ogni anno.
Tags : 
    
Cisco EMEA

IT Security: A Step by Step Guide for Growing Business - Stage 1 (The Security Essentials)

Published By: Symantec.cloud     Published Date: Sep 01, 2010
Part 1 describes the threat landscape as seen by SMBs, and describes the security controls that belong in Stage 1.
Tags : 
messagelabs us, it security, smb, risk management, protection, malware, anti-spam, anti-virus
    
Symantec.cloud

IT Security: A Step by Step Guide for Growing Business-Stage 2 (Customizing the Security Essentials)

Published By: Symantec.cloud     Published Date: Sep 01, 2010
This is the second part of a three-part white paper series. Part 2 describes how organizations can develop a security profile for themselves that will show them which of the Stage 1 controls they most need to build up and strengthen.
Tags : 
messagelabs us, it security, smb, security profile, anti virus, anti spam, firewalls, vulnerability
    
Symantec.cloud

Key Considerations in Choosing a Web Application Firewall

Published By: F5 Networks Inc     Published Date: Jul 27, 2015
Today, enterprises are extending their businesses by using more web-based and cloud-hosted applications, so a robust and agile web application firewall (WAF) isn't a luxury--it is a requirement. This whitepaper breaksdown some of the key factors you should consider when selecting a WAF to protect your business.
Tags : 
web application firewall, waf, cloud-hosted applications, it solutions, it security, web-based applications, networking, security
    
F5 Networks Inc

Kicking the NetMeeting Habit

Published By: WebEx     Published Date: Apr 02, 2009
This white paper presents a simple two-step process to kicking the NetMeeting habit: 1. Admitting there is a problem by recognizing the symptoms. 2. Creating a recovery plan by finding new applications and implementing a new solution.
Tags : 
webex, web conferencing, netmeeting, firewalls, apis, asp, live meeting, itu-t t.120 data conferencing
    
WebEx

L'Opinione Degli Esperti del Settore: il Compromesso tra Prestazioni e Protezione della Rete

Published By: McAfee     Published Date: Feb 25, 2015
This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.
Tags : 
network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
McAfee

La gui´a definitiva para la evaluacio´n de los firewalls para redes de empresas

Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Ofrecida durante un tiempo limitado. Consiga su copia hoy.Tome la decisión correcta sobre qué firewall es necesario para su negocio con La Guía para compradores de firewalls. Esta guía le da: - Los fundamentos de la tecnología moderna del firewall - Los 10 requisitos de negocios críticos que su nuevo firewall debería tener en cuenta - Información sobre cómo crear un (RFP) - Un plan de pruebas funcional para ayudar en su proceso de selección de firewall
Tags : 
firewall, palo alto, tecnologia, application security, firewalls
    
Palo Alto Networks

Learn About Firewall Design

Published By: Juniper Networks     Published Date: Oct 19, 2015
This Learn About briefly introduces guidelines for network firewall planning and design.
Tags : 
firewall, network, security, network architecture, network management, best practices, productivity
    
Juniper Networks

Learn About Firewall Evolution from Packet Filter to Next Generation

Published By: Juniper Networks     Published Date: Oct 20, 2015
How did firewalls develop to provide the strong, deep security and sophisticated capabilities that they offer us today? It’s a long story that took place over a relatively short period of time, and most likely you were part of it.
Tags : 
juniper, firewall, packet, filter, security, networking, wireless
    
Juniper Networks

Learn how to Protect Against Advanced Evasion Techniques

Published By: McAfee     Published Date: Feb 17, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
McAfee

Legacy Tools: Not Built for Today's Helpdesk

Published By: LogMeIn     Published Date: Jul 13, 2012
This paper explores the challenges of supporting a remote workforce with legacy tools and the hidden costs of these tools. In addition, it identifies best practices that decision makers can use to choose enterprise helpdesk support tools that better meet the needs of remote employees, while helping to cut costs.
Tags : 
helpdesk, mobility, remote workforce, corporate firewall, legacy support tools, cost-saving, it management, expense management
    
LogMeIn

Lenovo's 360° Approach to Security Available to You

Published By: Lenovo     Published Date: Aug 31, 2018
? Security threats are growing at an astronomical pace–theft, hacking, malware, ransomware... and the list goes on. That's why Lenovo integrates security at every level including built-in hardware, advanced software, a secure supply-chain, complete component validation and integrated services. In addition to Lenovo's own security features built into each device, Windows 10 Pro delivers comprehensive, built-in and ongoing security protections you can trust – including Windows Hello, Windows Defender Antivirus, firewall, and more. Read more in this comprehensive product guide, from personal device to data center, we'll show you how we're hard at work securing your devices from the threats.
Tags : 
    
Lenovo

LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS

Published By: Kaspersky     Published Date: May 11, 2016
As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.
Tags : 
kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall
    
Kaspersky

LoadMaster Application Delivery Controller Security Overview

Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching
    
KEMP Technologies

Lock Down Applications for PCI DSS Compliance

Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance
    
Secure Computing

Magic Quadrant for Enterprise Network Firewalls

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
"Next generation" capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.
Tags : 
palo alto, firewall, check point software technologies, gartner
    
Palo Alto Networks

Magic Quadrant for Intrusion Detection and Prevention Systems

Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security and risk management leaders should know that while IDPSs are being absorbed by firewall placements at the perimeter, they give the best protection. They're also responding to pressure from uptake of other threat defense solutions, and providing credible internal and cloud placement options.
Tags : 
magic quadrant, intrusion, detection, prevention, systems, cloud, internal
    
McAfee EMEA

Malicious Software Defense: Have We Moved Beyond Anti-Virus and Spyware Protection Software?

Published By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : 
patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware
    
Perimeter

Managing the Extended Enterprise for Profitabile Growth

Published By: SAP     Published Date: Apr 07, 2011
Find out how to build a sustainable extended enterprise, one that extends business processes beyond the firewall by outsourcing, enabling subsidiaries and business partners to share information and resources, and collecting business intelligence while cutting costs, streamlining operations, and opening up new markets.
Tags : 
sap, business intelligence, software solution, enterprise application, business management, business process automation, business process management
    
SAP

Más allá de la visibilidad y el control de las aplicaciones: Cómo debe ser un NGFW

Published By: Cisco     Published Date: Apr 11, 2016
Las redes modernas y sus componentes evolucionan constantemente y los firewalls de próxima generación tradicionales no pueden proporcionar el nivel de protección que necesitan las organizaciones.
Tags : 
    
Cisco

McAfee Next Generation Firewall: Examining Next Generation Network Security

Published By: McAfee     Published Date: Sep 15, 2014
This report presents the results of ESG Lab’s validation testing of the McAfee Next Generation Firewall. Integrating application control, intrusion detection, and evasion prevention, the product is designed to provide next generation firewall services, leveraging a unified software core to enable the deployment of multiple security services when and where they are needed.
Tags : 
application control, network security, firewall, firewall services, it security
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.