firewall

Results 151 - 175 of 411Sort Results By: Published Date | Title | Company Name

Advanced Targeted Attacks: How to protect against the next generation of cyber attacks

Published By: FireEye     Published Date: Nov 27, 2012
How to Protect Against the Next Generation of Cyber Attacks
Tags : 
fireeye, cyber attacks, firewalls, ips, protect, security, business technology
    
FireEye

Focus Experts Guide to IT Security: Unified Threat Management

Published By: Focus     Published Date: Feb 09, 2011
Discover the primary vendor solutions and decision factors that must be considered when selecting a Unified Threat Management product to provide network defense.
Tags : 
network security, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection
    
Focus

Strategies for Distributed Network Security

Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint

Downtime is Not an Option - High Availability Next Generation Firewall

Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint

Strategies for Distributed Network Security

Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint

Downtime is Not an Option - High Availability Next Generation Firewall

Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint

Strategies for Distributed Network Security

Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint

Downtime is Not an Option - High Availability Next Generation Firewall

Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint

Forcepoint Strategies for Distributed Network Security

Published By: Forcepoint     Published Date: Jun 06, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint

2018 Gartner Magic Quadrant for Enterprise Network Firewalls

Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Visionary for 2nd year in a row, in the Gartner 2018 Magic Quadrant for NGFW Gartner has named Forcepoint sole Visionary in their 2018 Magic Quadrant for NGFW, for ability to execute and completeness of vision. According to Gartner, “In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.”*
Tags : 
    
Forcepoint

Forcepoint Strategies for Securing Distributed Networks

Published By: Forcepoint     Published Date: Jul 30, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint

ForgeRock Open Identity Stack

Published By: ForgeRock     Published Date: Oct 08, 2014
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
identity access management, dynamic iam solution, public-facing, secure, business enabler, revenue-generating services, security, enterprise applications
    
ForgeRock

Open Identity Stack: Forging a New Future with Identity Relationship Management

Published By: ForgeRock     Published Date: Mar 10, 2015
Identity and Access Management (IAM) services were traditionally built for a company’s internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. Today though, a company must implement a dynamic IAM solution that serves employees as well as customers, partners, and devices, regardless of location. ForgeRock embraces this shift from internal, on-premises IAM to Identity Relationship Management (IRM): public-facing, secure, and accessible identity as business enabler. ForgeRock’s next-generation IRM platform is designed to empower CEOs and enterprises to engage with consumers via new revenue-generating services, while continuing to maintain our proven traditional IAM capabilities.
Tags : 
iam, forgerock, irm, relationship management, software development
    
ForgeRock

Who does NSS Labs “Recommend” for NGFW?

Published By: Fortinet     Published Date: Feb 04, 2014
In 2012, NSS Labs found that most available NGFW solutions “fell short in performance and security effectiveness.” In 2013 NSS Labs noted “marked improvement” and bestowed their “recommended” rating on 6 vendors. Please download the white paper to find out who they were.
Tags : 
fortinet, ngfw, next generation firewall, nss labs, security, it management, knowledge management, enterprise applications
    
Fortinet

Why are customers really deploying an NGFW?

Published By: Fortinet     Published Date: Feb 04, 2014
Next Generation Firewall (NGFW). It seems every IT Security expert is talking about them, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final deployment.
Tags : 
ngfw, next generation firewall, fortinet, security, it management, knowledge management, enterprise applications, business technology
    
Fortinet

What should I look for in a Next Generation Firewall? SANS provides guidance.

Published By: Fortinet     Published Date: Feb 04, 2014
With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions.
Tags : 
ngfw, next generation firewall, fortinet, security, it management, knowledge management, enterprise applications
    
Fortinet

Why Legacy Security Architectures Are Inadequate in a Multi-cloud World

Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Cloud services are a pillar of a digital transformation, but they have also become a thorn in the side of many security architects. As data and applications that were once behind the enterprise firewall began roaming free—on smartphones, between Internet-of-Things (IoT) devices, and in the cloud—the threat landscape expanded rapidly. Security architects scrambled to adjust their technologies, policies, and procedures. But just when they thought they had a handle on securing their cloud-connected enterprises, new business imperatives indicated that one cloud wasn’t enough. Modern enterprises operate in a multi-cloud world, where the threat landscape has reached a new level of complexity. Security teams are juggling a hodgepodge of policies, threat reports, and management tools. When each cloud operates in its own silo, the security architect has even more difficulty supporting the CISO or CIO with a coherent, defensible security posture.
Tags : 
    
Fortinet EMEA

The Network Leaders’ Guide to Secure SD-WAN

Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA

Introducing Fortinet’s Most Advanced, High Performance Network Security Solution for the Data Center

Published By: Fortinet, Inc     Published Date: Nov 14, 2013
This paper discusses the capacity of Fortinet’s high performance, high capacity data center solution with the ability to eliminate bottlenecks and meet unique requirements.
Tags : 
data center, asic, low latency, firewall, fortinet, palo alto networks, cisco, juniper
    
Fortinet, Inc

Understanding the Capabilities of Next-Generation Firewalls through Real-World Testing

Published By: Fortinet, Inc     Published Date: Nov 14, 2013
This paper explores the capabilities behind Fortinet’s Next-Generation Firewalls. The FortiGate devices provide a consolidated security offering backed by high-performance network protection for a lower TCO than other vendors.
Tags : 
data center, asic, low latency, firewall, fortinet, palo alto networks, cisco, juniper
    
Fortinet, Inc

Network Architecture with Security in Mind

Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon

10 Essential SQL Server Security Tasks

Published By: GreenSQL     Published Date: Nov 11, 2014
This report provides the 10 essential SQL server security tasks
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
GreenSQL

Microsoft SQL Server Security Best Practices

Published By: GreenSQL     Published Date: Nov 11, 2014
This white paper contains administrative and operational best practices that should be performed from a security perspective when using Microsoft SQL server. These best practices cover operative instructions and example code snippets needed for DBAs and Server Administrators.
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection
    
GreenSQL

Bloor InDetail: IBM Cloud Private for Data

Published By: Group M_IBM Q2'19     Published Date: Apr 01, 2019
IBM Cloud Private for Data is an integrated data science, data engineering and app building platform built on top of IBM Cloud Private (ICP). The latter is intended to a) provide all the benefits of cloud computing but inside your firewall and b) provide a stepping-stone, should you want one, to broader (public) cloud deployments. Further, ICP has a micro-services architecture, which has additional benefits, which we will discuss. Going beyond this, ICP for Data itself is intended to provide an environment that will make it easier to implement datadriven processes and operations and, more particularly, to support both the development of AI and machine learning capabilities, and their deployment. This last point is important because there can easily be a disconnect Executive summary between data scientists (who often work for business departments) and the people (usually IT) who need to operationalise the work of those data scientists
Tags : 
    
Group M_IBM Q2'19

CISOs Investigate: Endpoint Security Peer-authored Research

Published By: Group M_IBM Q418     Published Date: Nov 07, 2018
The rise of the cloud and mobile computing has rapidly changed the nature of enterprise cybersecurity. The old paradigm, where all work was done behind a company firewall, has been breaking down. Employees work not just at the office, but also on the road and at home, on mobile devices and on their own personal computers. They’re no longer using a limited stack of enterprise applications. Instead, they increasingly require access to a wide variety of apps, cloud services, and new communication platforms.
Tags : 
    
Group M_IBM Q418
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.