Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Solid State Firewall Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Solid State Firewall AppliancesWhite Papers (View All Report Types)
 
Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

Defeating Advanced Persistent Threat Malware
sponsored by Infoblox
WHITE PAPER: How can you protect your organization from APT Malware?  Read this whitepaper to learn why a DNS Firewall implementation is a MUST for your organization and how the Infoblox DNS Firewall may be the industry's first true DNS security solution.
Posted: 10 Sep 2013 | Published: 31 Jan 2013

Infoblox

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Extending Next Generation Firewalls – Security Leaders must Address Threats from Rising SSL Traffic
sponsored by Fortinet, Inc.
WHITE PAPER: This exclusive paper discusses the next generation firewall, examining its market drivers, critical requirements and how it is extending to respond to the ever-changing needs of the modern enterprise.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Fortinet, Inc.

User-ID Linked with Next-Generation Firewalls Improves Network Visibility and Controls
sponsored by Palo Alto Networks
WHITE PAPER: This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection.
Posted: 24 Jan 2014 | Published: 12 Nov 2012

Palo Alto Networks

CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones
Posted: 17 May 2011 | Published: 16 May 2011

FireEye

Unclutter Your Data Center With Consolidated Log Management
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.
Posted: 17 Oct 2013 | Published: 13 Jun 2013

VMware, Inc.

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall
sponsored by Riverbed Technology, Inc.
WHITE PAPER: PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

Securing Physical and Virtual IT Assets without Hardware, Firewalls or VLANs
sponsored by Apani
WHITE PAPER: This white paper will examine the challenges of traditional security approaches and reveal the many advantages of software-based access management.
Posted: 18 Nov 2008 | Published: 18 Nov 2008

Apani
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement