multilayered

Results 1 - 5 of 5Sort Results By: Published Date | Title | Company Name

Modern Data Centers Need a New Security Approach

Published By: Cisco     Published Date: Mar 22, 2019
Be proactive in protecting your data center with complete visibility, multilayered segmentation, and threat protection that follow the workload everywhere.
Tags : 
    
Cisco

MSP Achieves Air-Tight Security and Great Work/Life Balance with WatchGuard

Published By: WatchGuard     Published Date: Oct 17, 2012
Learn how STF Consulting used Watchguard to help them develop an easy to implement solution and helped them create multilayered network protection.
Tags : 
watchguard, utm, unified threat management, it infrastructure, it security, data management, security, business technology
    
WatchGuard

Building a Threat Model for Small and Medium Sized Businesses

Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing
    
ESET

Five Ways to Improve Your Wireless Security

Published By: Cisco     Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
Tags : 
cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy
    
Cisco

Protecting Client Systems from the Crimeware Invasion

Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware, intrusion prevention, anti virus, hacker prevention
    
Symantec
Search      

Add Research

Get your company's research in the hands of targeted business professionals.