firewall

Results 76 - 100 of 411Sort Results By: Published Date | Title | Company Name

Cisco Umbrella at a glance

Published By: Cisco EMEA     Published Date: Nov 13, 2017
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate owned laptops accessing the internet from other networks. More cloud apps, mean that users don’t need to be on the corporate network to get work done. And more branch offices connecting directly to the internet.
Tags : 
visibility, protection, deployment, management, platform, integration, cloud, infrastructure
    
Cisco EMEA

Cisco Umbrella At A Glance

Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco

CISOs Investigate: Endpoint Security Peer-authored Research

Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418

Citrix NetScaler: A Powerful Defense Against DOS Attacks

Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems

Cloud Security - A Shared Responsibility Model

Published By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
Despite long-standing concerns captured in a myriad of surveys, security in the cloud has progressed to a more practical and achievable level. The cloud represents a shared security responsibility model whereby that responsibility is split between the Cloud Service Provider and the cloud customer. For organisations moving some or all of their applications and data to the cloud, acceptance of this model clears the way to more thoughtful consideration for how security can and should be architected — from the ground up. As a result, IT and IT Security leaders now have a much clearer trajectory to support their business operations in the cloud in a secure manner.
Tags : 
cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection, intrusion prevention, log management, malware, vulnerabilities, managed security services, network security, pci compliance, penetration testing, ransomware security consulting, security management, security monitoring, vulnerability assessments
    
Secureworks ABM UK 2017

Cloud security is NOT self-Evident(.io)

Published By: Evident.io     Published Date: Nov 19, 2015
Evident.io has a significant head start in this nascent corner of the cloud security space. Besides addressing a critical portion of the cloud's attack surface that isn't well covered by other vendors yet, Evident.io has built a platform that transcends the niche it currently addresses. The API/SDK consumption capabilities, data analytic and user workflow portions of the company's Evident Security Platform are valuable assets that it can leverage to grow into other areas in the future.
Tags : 
evident, cloud security, security platforms, datacenter, firewalls, public cloud, api consumption, networking, security, it management, data management, data center
    
Evident.io

Cloud Security Whitepaper

Published By: Company Name     Published Date: May 04, 2016
Lorem ipsum dolor sit amet, urna eu posuere. Nec vitae amet. Elementum ut erat. Nascetur neque, accumsan lorem et placerat consequat. Rutrum ut duis, nibh velit velit metus eleifend nnc
Tags : 
cloud, cloud security, it security, firewall, networking, data security, data management, security management, it management
    
Company Name

Collaboration for Modern Workplaces

Published By: Intel     Published Date: Jul 17, 2019
Today, business is conducted in a fast-paced, on-demand, globally dispersed environment. Maintaining a competitive edge requires cohesive real-time collaboration. Mobile workers, partners, vendors, suppliers, and even customers expect to be able to work together seamlessly, both inside and outside the firewall. But delivering tools for high-quality collaboration is often challenging, due to the need for businesses of all sizes to support a wide range of personal and business devices. Mixing disparate devices with complex conferencing solutions often lead to frustrated employees, while businesses face a labor-intensive, costly endeavor without a high ROI. In addition, collaboration is evolving with businesses creating small "huddle" spaces and open workspaces that increase the demand for ubiquitous, effective conferencing. The Intel Unite ' solution is a fast, simple, cost-efficient way to deliver a more secure, manageable, high-quality collaboration experience. Whether you select the
Tags : 
    
Intel

Collaborative Efforts: Survey Reveals Clear Business Acceleration Using On-Demand Collaboration Tech

Published By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : 
webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
    
WebEx

Compare Approaches for Web, DNS, and Infrastructure Security

Published By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale—you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : 
akamai, web, dns, infrastructure security, sql, cloud security solution, networking, security, knowledge management, enterprise applications, business technology
    
Akamai Technologies

Comparing Email Management Systems that Protect Against Spam, Viruses, Malware & Phishing Attacks

Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware, virus, anti virus, sunbelt, sunbelt software, architecture, phishing, policy based, policy-based, malware, trojan, trojans, mail server
    
Sunbelt Software

Comparing price/performance: WatchGuard vs. Juniper, Fortinet, Cisco, and SonicWall

Published By: WatchGuard Technologies     Published Date: Apr 21, 2010
Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Tags : 
watchguard technologies, unified threat management, utm, network humming, security, firewall, vpn, tco, anti spam, anti spyware, anti virus, firewalls, security management, total cost of ownership
    
WatchGuard Technologies

Conditional Access: Going Beyond Perimeter-Based Security

Published By: Jamf     Published Date: Jan 18, 2018
For decades, organizations built “walls” around their company and leveraged network perimeters as the first line of defense. But as workspaces have become more fluid, the security perimeter has changed. The concept of creating a network and protecting it by firewall may not be enough. It’s time to rethink a traditional, perimeter-based security model.
Tags : 
    
Jamf

Content is the New Perimeter: The Security and Regulatory Drivers for Information Rights Management

Published By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
    
Intralinks

Content is the New Perimeter: The Security and Regulatory for Information Rights Management

Published By: Intralinks     Published Date: Oct 30, 2014
The proliferation of file sync and share (FSS) products and other cloud services designed for consumers, along with mobile devices, leads to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. So what’s the solution? Protect your information with next-generation information rights management (IRM) technology. You can email, copy, upload or share any IRM-secured document — and the protection travels with it. Key topics include: The threat posed by Dropbox and other consumer-grade FSS providers The need for lifetime control of information and content The ability to perform audits, and locate files, anywhere, and who accessed them How next generation IRM technology is available to add a new layer of security to every file Information technology professionals interested in using IRM for secure collaboration don’t want to miss this important report.
Tags : 
rights management, security and regulatory, file sync and share, cloud services, irm technology, secure collaboration, security, business technology
    
Intralinks

Controlling Botnets with the Next-Generation Firewall

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Read this white paper to learn how botnets work and about the role of next-generation firewalls in controlling threats. Download now.
Tags : 
palo alto, botnets, firewall, malware, business technology
    
Palo Alto Networks

Cutting the Cost of Application Security

Published By: Imperva     Published Date: Jun 14, 2012
This paper describes the financial implications of Web attacks, DDoS attacks, and other Web-based threats. It shows how the SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and Website downtime.
Tags : 
imperva, application security, security costs, roi, firewall, ddos, web attacks, it spending, firewalls, security management, return on investment, web service security, data protection, business technology
    
Imperva

Cyber Resilience: It’s Not About The 98 Percent You Catch, It’s About The 2 Percent You Miss

Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network, best practices, business technology
    
Cisco

Cybersecurity for Dummies

Published By: Palo Alto Networks     Published Date: Jun 09, 2014
This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, security, network security, threats, malware, zero trust, breach, security breaches, network protection, cybersecurity, firewall, it management
    
Palo Alto Networks

Cybersecurity for Dummies

Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Palo Alto Networks is leading a new era in cybersecurity by securing thousands of enterprise, government, and service provider network from cyber threats and protecting our digital way of life.
Tags : 
palo alto, firewall, cyber security, automation, cybersecurity for dummies
    
Palo Alto Networks

Cybersecurity for Dummies eBook

Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers, virus, spam, malware, application security, anti spam, anti virus, email security, hacker detection, identity management, security management, wireless security, data protection
    
Palo Alto Networks

Cybersecurity Imperatives Reinvent Your Network Security With Palo Alto Networks

Published By: Palo Alto Networks     Published Date: Dec 11, 2013
Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security
Tags : 
cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps, application security
    
Palo Alto Networks

Cyberwar Threats: New Security Strategies for Governments

Published By: Tripwire     Published Date: Feb 08, 2013
Cyberwar fundamentally changes how government must handle security. Firewalls, intrusion detection systems and other security devices can stop the average hacker, but new threats use stealth techniques that these defenses cannot detect on their own.
Tags : 
cyberwar, hacker detection, defense, security, government, firewall, cyber attacks, cyber threats, intrustion detection, intrusion defense
    
Tripwire

Data Center Firewall Aces Performance Test

Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Turning on firewall features can sometimes result in a significant performance hit, creating an obstacle for network architects. In this Network World Clear Choice test, learn about a firewall solution that can help your business overcome these performance challenges by maxing our network capacity while also offering filtering and attack protection capabilities.
Tags : 
network world, data center, firewall, load balancer, scalability, data center management, dos protection, security, network, server traffic, application perforamce, server loading, application delivery controllers, data management, application security, firewalls, network security appliance, cloud computing
    
F5 Networks Inc

Data Security And Financial Services

Published By: Citrix ShareFile     Published Date: Apr 14, 2017
Some financial professionals store or share terabytes of electronic information, including quarterly reports, billing statements or even sensitive personal data belonging to clients. Read this e-Book to better understand your security risks. You’ll learn: • The common challenges of data security • Steps to solve these challenges • And much more
Tags : 
data security, data protection, network security, firewall security, it security, technology security
    
Citrix ShareFile
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.