IT Management  >   Systems Operations  >   Security  >   Internet Security  >  

Network Firewall Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Firewall Management White Papers (View All Report Types)
 
Deliver Simple and Secure Access to Behind-the-Firewall Business Resources
sponsored by IBM
WHITE PAPER: Learn the ins-and-outs of a solution capable of delivering simple and secure access to behind-the-firewall business resources such as Windows File Share content and intranet sites without requiring changes to your network, firewall security configuration, or device VPN.
Posted: 03 Sep 2014 | Published: 03 Sep 2014

IBM

Gorillas on Your List – A Diversified OEM Environment Can Lower Your Risk
sponsored by Dimension Data
WHITE PAPER: This informative whitepaper covers the value of breaking free from a single original equipment manufacturer and diversifying the commodities in your data center.
Posted: 05 Feb 2014 | Published: 15 Jan 2014

Dimension Data

Implementing HA at the Enterprise Data Center Edge to Connect to a Large Number of Branch Offices
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper explains how to deploy a highly available, working cluster by taking the design considerations and applying them to an actual deployment.
Posted: 19 Dec 2008 | Published: 01 Jul 2007

Juniper Networks, Inc.

Meeting Today's Security Challenges with End-to-end Access Control
sponsored by Juniper Networks, Inc.
WHITE PAPER: This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.
Posted: 19 Dec 2008 | Published: 01 Mar 2008

Juniper Networks, Inc.

Network security: Have you implemented a next-gen firewall?
sponsored by Hewlett-Packard Company
WHITE PAPER: This guide explores why you need a next-generation firewall and how you can dictate network access, allowing in only those who are authorized.
Posted: 04 Feb 2014 | Published: 04 Feb 2014

Hewlett-Packard Company

Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER: Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008

Citrix

Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Top 5 DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: This paper will highlight how traditional DNS infrastructure deployments can actually increase the risks of DNS attacks. Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 15 Aug 2013 | Published: 31 May 2013

Infoblox

2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

The Security Value of a Dozen Next Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: A security research group has put together an info-graphic that summarizes the results of independent studies on a dozen different NGFW products.
Posted: 18 Feb 2015 | Published: 30 Sep 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement