IT Management  >   Systems Operations  >   Security  >   Security Management  >  

UTM

RSS Feed    Add to Google    Add to My Yahoo!
UTM White Papers (View All Report Types)
 
Best Practices for Deploying LAN Security and NAC
sponsored by Nevis Networks
WHITE PAPER: Download this paper and discover best practices for planning and deploying a LAN Security solution. Learn about an integrated security strategy that provides reactive protection to identify and filter out malware attacks that infiltrate your network.
Posted: 05 Mar 2007 | Published: 01 Mar 2007

Nevis Networks

Beating the Bad Guys: Strategies to Mitigate the Malware Threat
sponsored by RSA
WHITE PAPER: While there is no silver bullet to eliminate cybercrime and malware, there are ways to mitigate risk, requiring a combination of multiple technologies to protect endpoints, online sessions and transactions. View this paper to examine the regulatory environment and uncover successful strategies for beating the bad guys.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

RSA

Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

WebPulse Collaborative Defense
sponsored by BlueCoat
WHITE PAPER: Malware is constantly evolving, so you need a dynamic security defense that can keep up with the latest web-based threats. Learn how the Blue Coat WebPulse™ collaborative defense powers Blue Coat's web security portfolio, delivering fast and effective Web 2.0 threat protection for 75 million users worldwide.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

BlueCoat

Top 10 Threats to SME Data Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: For a no-nonsense perspective on the most common types of network and data compromises in small to medium-sized businesses, read this white paper. It lists the ten most common vectors of data compromise, with practical techniques and defenses to counter them.
Posted: 26 Oct 2009 | Published: 26 Oct 2008

WatchGuard Technologies, Inc.

Layered Security: Protecting Your Data in Today's Threat Landscape
sponsored by Tripwire, Inc.
WHITE PAPER: In this white paper, learn how threats have evolved over time, shortcomings of the perimeter-centric approach to security, steps to implementing a layered security approach to security, and much more.
Posted: 15 Nov 2011 | Published: 15 Nov 2011

Tripwire, Inc.

Hybrid Clouds
sponsored by Trend Micro, Inc.
WHITE PAPER: Hybrid clouds offers the best of both worlds, but it also has the largest attack surface, requiring organizations to deploy security across both private and public cloud elements. This white paper explores the business benefits of hybrid clouds, security considerations, and how to mitigate risks.
Posted: 07 Oct 2011 | Published: 07 Oct 2011

Trend Micro, Inc.

The Advantages of Multi-Core Architecture in Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: Securing your company's network requires a comprehensive approach that includes intrusion prevention, data leak protection, and content filtering. This white paper examines how UTM solutions provide enhanced security that is efficient and cost-effective.
Posted: 28 Apr 2008 | Published: 01 Apr 2008

SonicWALL

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Securing the Virtual World
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: With the growing need to reduce costs and improve efficiencies and availability of IT resources, organizations have increasingly turned to virtualization. But there are questions around the security within these environments. This paper explores the new security challenges of virtualization and how to overcome them with a layered security approach.
Posted: 27 Sep 2012 | Published: 27 Sep 2012

WatchGuard Technologies, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
UTM White Papers | UTM Multimedia | UTM IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement