ngfw

Results 76 - 86 of 86Sort Results By: Published Date | Title | Company Name

Strategies for Distributed Network Security

Published By: Forcepoint     Published Date: May 14, 2019
Forcepoint Strategies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass Download our whitepaper to learn more!
Tags : 
    
Forcepoint

Técnicas de Evasão Avançadas para Principiantes

Published By: McAfee     Published Date: Aug 15, 2014
Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti, next generation firewall, ngfw, network security, firewalls
    
McAfee

The Importance of a Next Generation Firewall

Published By: McAfee     Published Date: Feb 17, 2014
Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.
Tags : 
cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance
    
McAfee

The Network Leaders’ Guide to Secure SD-WAN

Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA

Throughput and Scalability Report

Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering, http traffic, application awareness, application security, encryption, firewalls, internet security, network security appliance, security management, security policies, software testing
    
McAfee

Top 10 Advantages of a Proxy Deployment in Conjunction with a Next-Generation Firewall

Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec

Vendor Landscape: Next Generation Firewall

Published By: Barracuda     Published Date: Jul 25, 2014
This research paper by Info-Tech evaluates 10 competitors in the NGFW market to help you choose the right vendor and products for your enterprise needs.
Tags : 
ngfw, next generation firewall, evaluation of security providers, security vendor comparison, security, research
    
Barracuda

What should I look for in a Next Generation Firewall? SANS provides guidance.

Published By: Fortinet     Published Date: Feb 04, 2014
With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different. John Pescatore of SANS Institute originally coined the phrase and now explains what he suggests enterprises look for when considering alternative NGFW solutions.
Tags : 
ngfw, next generation firewall, fortinet, security, it management, knowledge management, enterprise applications
    
Fortinet

Who does NSS Labs “Recommend” for NGFW?

Published By: Fortinet     Published Date: Feb 04, 2014
In 2012, NSS Labs found that most available NGFW solutions “fell short in performance and security effectiveness.” In 2013 NSS Labs noted “marked improvement” and bestowed their “recommended” rating on 6 vendors. Please download the white paper to find out who they were.
Tags : 
fortinet, ngfw, next generation firewall, nss labs, security, it management, knowledge management, enterprise applications, application integration, business technology
    
Fortinet

Why are customers really deploying an NGFW?

Published By: Fortinet     Published Date: Feb 04, 2014
Next Generation Firewall (NGFW). It seems every IT Security expert is talking about them, but what are people really doing? This webcast covers 5 real-world customer deployments and explores business drivers, key requirements, solutions considered and the final deployment.
Tags : 
ngfw, next generation firewall, fortinet, security, it management, knowledge management, enterprise applications, business technology, infrastructure management
    
Fortinet

Why Your Next Generation Firewall Protection Isn't Enough

Published By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : 
firewall, network security, urls, ips, adequate protection, security
    
Webroot Inc
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.