firewall

Results 301 - 325 of 410Sort Results By: Published Date | Title | Company Name

Secure Apps + Instant Access: Connect any user to any app with zero changes to the network

Published By: BubblewrApp     Published Date: Jan 20, 2015
"Agile companies push new application versions to production every few weeks, sometimes even faster. With super-fast Beta cycles being the norm, getting various user groups, such as remote QA teams, access to staging environments can slow down your delivery timelines. What if you could enable secure access for any number of users in 15 minutes? BubblewrApp’s Service Access Service (SAS) is a turnkey, cloud-based service that acts as the first line of defense for your applications. BubblewrApp’s SAS enables its customers to grant easy access to applications deployed ""behind the firewall"" (on premise) or ""inside the Virtual Private Cloud"" (in a public cloud) from any remote location. Customers can begin leveraging SAS within minutes without requiring any changes to pre-existing network and security policies. The result is a vastly superior secure application access model that enables a zero CapEx, low OpEx model for secure application access, both on premise and in the public cloud."
Tags : 
secure access, security policies, new applications, delivery timeline, cloud-based service, sas, application access model, software development
    
BubblewrApp

Secure the SaaS Tsunami

Published By: OneLogin     Published Date: Oct 24, 2017
SaaS has fundamentally changed security requirements. We used to just go into work, and everything—corporate applications, sensitive customer data, employee health records, etc.—was within the “safe” four walls of the corporate network behind a firewall. Now employees work remotely and use mobile devices, including unmanaged, personal devices. They access SaaS apps that live in the cloud without any sort of firewall that IT can use to monitor and manage access. Prominent examples include Salesforce.com, Google Apps, Office 365, Box, and many others. As employees use these SaaS apps, they are creating proprietary company data, often confidential in nature, that exists outside the control of IT, creating new challenges for security teams. In this new world, IT needs to track sensitive corporate data in third-party SaaS apps, and ensure that only the right people have the right level of access to it. In this whitepaper, we’ll explain ten steps on how to do that
Tags : 
    
OneLogin

Securing Applications: It’s More Than a Compliance Issue

Published By: SPAN Systems     Published Date: Aug 30, 2013
2013 was a challenging year for major companies fighting high-profile security breaches. Apple, Twitter, Facebook, Microsoft, Tumblr, Burger King, Jeep, Evernote and The New York Times are just a few of the big-name organizations that had to combat security problems.
Tags : 
securing applications, compliance, security, applications, security, firewall, compliance issues, loopeholes
    
SPAN Systems

Securing Enterprise Hybrid Clouds

Published By: Juniper Networks     Published Date: Aug 21, 2017
High-performance, space-efficient, next-generation firewalls defend enterprise hybrid cloud infrastructure
Tags : 
    
Juniper Networks

Securing Enterprise Hybrid Clouds

Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks

Securing Enterprise Hybrid Clouds (solution brief)

Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks

Securing the Cloud

Published By: F5 Networks Inc     Published Date: Apr 18, 2012
Cloud computing has become another key resource for IT deployments, but securing applications and data in the cloud remains a concern. Learn strategies for keeping your most precious assets safe, no matter where they reside.
Tags : 
cloud computing, cloud security, protection data in the cloud, cloud data protection, cloud deployment, application protection in the cloud, authentication, aaa
    
F5 Networks Inc

Securing the Cloud

Published By: F5     Published Date: Jan 31, 2013
Cloud computing is becoming a key IT resource, but securing applications and data in the cloud remains a concern. Secure remote access tech, web application firewalls, network-side scripting and other strategies can make cloud deployments secure.
Tags : 
securing cloud, cloud computing, security, cloud security, authenticaion, authorization, it management, data management
    
F5

Securing the Enterprise 5 Pragmatic Steps to Security

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Finding a strategic partnership with a trusted security expert that can assist you in all the aspects of information security is vital. SecureWorks is a market leader in security that can close the security gap in organisations by evaluating security maturity across an enterprise, help define security strategies and implement and manage security program plans. We are a true strategic partner that can help a CISO embed security at all levels of the organisation.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
    
Secureworks ABM UK 2017

Securing Traditional and Cloud-Based Data Centers with Next-Generation Firewalls

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment. Often referred to as private cloud, these projects are fueling significant expansion into what can be referred to as the public cloud.
Tags : 
    
Palo Alto Networks

Securing Traditional and Cloud-Based Data Centers with Next-Generation Firewalls

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment.
Tags : 
palo alto, virtualization, cloud, firewall, security, digital
    
Palo Alto Networks

Security Analytics: A Required Escalation In Cyber Defenses

Published By: Arbor     Published Date: Sep 15, 2014
In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.
Tags : 
cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management
    
Arbor

Security and Governance for Content Distributed on Mobile Devices

Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content
    
bigtincan

Security Considerations When Redesigning Your Data Center Network

Published By: Juniper Networks     Published Date: Jul 31, 2019
When considering data center security, you will need to decide which security functions need to be deployed and where you want to deploy them. These functions are expected to be implemented wherever a firewall is used. Read our eGuide to find out which security functions to deploy, and where to deploy them, including: • Next-generation firewalls • Intrusion prevention systems • Centralized security management
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks

Security Design Principles

Published By: Nixu     Published Date: Nov 06, 2006
This white paper is an overview of the Nixu Security System and the various security principles it encompasses.  Topics discussed include security design, application security, OS hardening, patch management, and more.
Tags : 
network security, patch management, firewall, intrusion prevention, application security, security management, nixu, security
    
Nixu

Security Without Compromise

Published By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco

Security Without Compromise

Published By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco

Security Without Compromise

Published By: Cisco     Published Date: Apr 03, 2014
This white paper by Cisco explores the IT innovation which is fueling change around the world and how IT musty adapt security practices and protections to meet these changes in work patterns, device usage and applications.
Tags : 
security, firewall, next generation, applications, byod, threats
    
Cisco

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

Published By: Cisco     Published Date: Jan 16, 2014
Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
Tags : 
cisco, security, next-gen threat defense, byod, saas, firewalls, next-generation firewalls
    
Cisco

See what SANS says about McAfee Next Generation Firewall. Download the free report.

Published By: McAfee     Published Date: Aug 14, 2014
Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.
Tags : 
sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
McAfee

See Why Gartner Named Akamai a WAF Leader

Published By: Akamai Technologies     Published Date: Jul 02, 2018
Gartner named Akamai a Leader in their 2017 Magic Quadrant for Web Application Firewalls. A web application firewall is an essential element in your defense against application-layer attacks, which pose an ever-greater threat to productivity and security. The Akamai approach to WAF combines: An anomaly detection model A repeatable testing framework to measure effectiveness Threat intelligence to identify the latest threats A cloud platform for global scale Managed security services to help organizations better protect their websites and web applications over time
Tags : 
    
Akamai Technologies

Sete funções chave para neutralizar as técnicas de evasão avançadas

Published By: McAfee     Published Date: Aug 15, 2014
As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
McAfee

Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall

Published By: McAfee     Published Date: Aug 14, 2014
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
McAfee

Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall

Published By: McAfee     Published Date: Jan 20, 2015
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
McAfee

Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall

Published By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : 
advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
Intel Security
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.