IT Management  >   Systems Operations  >   Security  >   Internet Security  >  

Network Firewall Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Firewall ManagementWhite Papers (View All Report Types)
 
Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Limited

Defeating Advanced Persistent Threat Malware
sponsored by Infoblox
WHITE PAPER: How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution.
Posted: 10 Sep 2013 | Published: 31 Jan 2013

Infoblox

Get the most from the move to a next-generation firewall
sponsored by McAfee, Inc.
WHITE PAPER: This white paper will help network and cybersecurity teams understand the things they can and should demand from next-generation firewalls.
Posted: 30 Jul 2014 | Published: 31 Dec 2013

McAfee, Inc.

5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know
sponsored by Symantec Corporation
WHITE PAPER: Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.
Posted: 11 Jun 2009 | Published: 11 Jun 2009

Symantec Corporation

Revolutionary architecture, evolutionary deployment
sponsored by Cisco
WHITE PAPER: Check out this resource to learn about how rethinking your firewall for context-aware protection can help you achieve breakthrough security while protecting existing security investments. Read on to learn more.
Posted: 08 Apr 2013 | Published: 28 Feb 2013

Cisco

The Good, Bad and Necessary: The Complete Guide to PCI 6.6 Success
sponsored by Breach Security
WHITE PAPER: This resource provides IT security professionals with the information needed to understand PCI compliance and specifically, one of the standard's latest requirements, 6.6. In addition, the paper offer tips for successful PCI 6.6 compliance and highlights compliance successes from real-world companies.
Posted: 14 Aug 2009 | Published: 08 Jun 2009

Breach Security

Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER: Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008

Citrix

Small Business Security: What You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: Small business security is dependant upon defending against common threats, such as viruses, spyware, malware and hackers.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Cisco Systems, Inc.

KineticD Security
sponsored by KineticD
WHITE PAPER: The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

KineticD

Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks UK
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

Dell SecureWorks UK
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement