IT Management  >   Systems Operations  >   Security  >   Internet Security  >  

Firewall Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Firewalls, Firewall Security, Fire Wall, Network Firewall Management
DEFINITION: Firewall Builder, also known as Fwbuilder, is a vendor-neutral configuration and management application for firewalls. The application was created for the Linux operating system; versions are available for other operating systems, including Windows and Macintosh. According to Fwbuilder's user guide, both network administrators and hobbyists managing home-based local area networks (LANs) can simplify  … 
Definition continues below.
Firewall Management White Papers (View All Report Types)
51 - 75 of 118 Matches Previous Page  |  Next Page
How Traditional Firewalls Fail Today's Networks — And Why Next-Generation Firewalls Will Prevail
sponsored by Dell, Inc.
WHITE PAPER: Learn exactly where traditional firewalls fall short, and discover how next-generation firewalls provide excellent network performance without compromising security. Read this e-book and uncover where traditional firewalls fall short, and how next-generation firewalls fill those gaps.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell, Inc.

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012


Next-Generation Firewalls (NGFWs)
sponsored by AlgoSec
WHITE PAPER: This paper will highlight tips to effectively implement next-generation firewalls and optimize policies so that you can enjoy the clear benefits without falling into overly complex, unmanageable and risky policy traps.
Posted: 27 Aug 2013 | Published: 31 Dec 2012


Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

WatchGuard Technologies, Inc.

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013


A Buyer's Guide to Endpoint Protection Platforms
sponsored by Intel Security
WHITE PAPER: This Gartner buyer's guide to endpoint protection platforms aims to help you select the endpoint protection platform (EPP) that best aligns with your organization's needs. View now for key recommendations and advice before purchasing an EPP.
Posted: 02 Aug 2013 | Published: 17 Apr 2012

Intel Security

How a DNS Firewall Helps in the Battle Against Advanced Persistent Threat and Similar Malware
sponsored by Infoblox
WHITE PAPER: Uncover the role a DNS firewall can play in your security strategy for reducing loss of data due to stealthy advanced persistent threats (APTs) and other malware attacks.
Posted: 24 Apr 2013 | Published: 24 Apr 2013


Next-generation firewalls and your security strategy
sponsored by Cisco
WHITE PAPER: This whitepaper addresses the blurred lines between business and pleasure created by today's mobile trends and offers a new strategy to deal with it.
Posted: 11 Apr 2013 | Published: 11 Apr 2013


Revolutionary architecture, evolutionary deployment
sponsored by Cisco
WHITE PAPER: Check out this resource to learn about how rethinking your firewall for context-aware protection can help you achieve breakthrough security while protecting existing security investments. Read on to learn more.
Posted: 08 Apr 2013 | Published: 28 Feb 2013


Increasing Security Throughput with Palo Alto Networks & Brocade
sponsored by Copper River IT
WHITE PAPER: The growing volume of information entering and leaving a data center often exceeds a single network's capacity. Read this white paper to learn how you can maintain data center speeds without sacrificing your security.
Posted: 05 Oct 2012 | Published: 04 Oct 2012

Copper River IT

2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

GFI Reviews and awards
sponsored by GFI LanGuard
WHITE PAPER: Access this exclusive resource to read reviews and uncover the awards given to one particular network security and vulnerability scanner by 80 different websites and critics. Learn why this award-winning solution is trusted by so many organizations across the globe!
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Webroot Secure Anywhere - Endpoint Protection
sponsored by Webroot
WHITE PAPER: Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
Posted: 06 Aug 2012 | Published: 06 Aug 2012


Application Security in the Cloud with BIG-IP ASM
sponsored by F5 Networks
WHITE PAPER: Access this white paper to discover a high-performance web application firewall that provides a strategic point of control within the infrastructure from which enterprises can adapt to changing conditions. Learn how your organization can benefit from this cloud-ready solution, offering cloud security for virtualized applications.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

F5 Networks

Closing the Back Door on Network Application Vulnerabilities
sponsored by Sophos, Inc.
WHITE PAPER: This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Sophos, Inc.

Palo Alto Networks in the Data Center: Eliminating Compromise
sponsored by Palo Alto Networks
WHITE PAPER: This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.
Posted: 20 Apr 2012 | Published: 20 Apr 2012

Palo Alto Networks

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall
sponsored by Riverbed Technology, Inc.
WHITE PAPER: PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.

Social Business in the Cloud
sponsored by IBM
WHITE PAPER: Deepen your customer relationships. Drive operational effectiveness. Optimize your workforce. Read this white paper and see how using LotusLive services to become a social business can help your organization simplify, speed up and enhance interactions in practically all areas of the business.
Posted: 01 Dec 2011 | Published: 01 Dec 2011


XML Threat Model for REST, SOA and Web 2.0
sponsored by Intel
WHITE PAPER: This technical document intended for Architects and Developers describes a comprehensive threat model for a new breed of threats based on XML content, including XML languages used in the Service Oriented Architecture (SOA) paradigm such as SOAP and the Web Services Description Language [WSDL].
Posted: 12 Sep 2011 | Published: 08 Sep 2011


Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

Dell SecureWorks

Resource Protection in Virtualized Infrastructures
sponsored by Intel
WHITE PAPER: While virtualization brings a variety of infrastructure advantages, there are evolving security concerns that must be addressed. Access this exclusive resource for a detailed analysis of the security concerns associated with server virtualization.
Posted: 13 Jun 2011 | Published: 01 Aug 2009


Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 09 Jun 2011 | Published: 08 Jun 2011

Dell SecureWorks

Cloud-based Enterprise-class Wi-Fi Management
sponsored by Aerohive Networks
WHITE PAPER: After you’ve enabled your people to work from virtually anywhere, you need to maintain essential security and control under the constant pressure to drive down costs. Uncover a cloud-based management solution that provides all the features and functionality of a behind-the-wall firewall network management system without the hassles.
Posted: 01 Jun 2011 | Published: 31 May 2011

Aerohive Networks

Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 16 May 2011 | Published: 29 Oct 2010


CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: This white paper will tell you about a new security solutions and the need to your business to update it's security solutions to a Next-Generation security system.
Posted: 09 May 2011 | Published: 09 May 2011

51 - 75 of 118 Matches Previous Page    1 2 3 4 5    Next Page
FIREWALL MANAGEMENT DEFINITION (continued): …  management tasks with the application. Fwbuilder supports the OpenBSD Packet Filter, Cisco PIX Series security devices, and iptables and ipfilter Linux utilities. Fwbuilder allows for the simultaneous management of multiple firewalls on multiple servers. Programming components called policy compilers facilitate fine-tuning of firewall policy rules without the need for the administrator to remember all of the details for each firewall or server. The policy compilers also ensure that firewalls are "sane" -- that is, that there are no contradictions or errors that would interfere with the intended … 
Firewall Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement