Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Firewall Appliances

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Solid State Firewall Appliances, Firewalls, Fire Wall, Network Firewall Appliances
DEFINITION: Devices that provide firewall protection for a network.
Firewall AppliancesReports
76 - 100 of 112 Matches Previous Page  | Next Page
E-Book: Technical Guide on Web Application Firewalls
sponsored by SearchSecurity.com
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

SearchSecurity.com

Next-generation capabilities of enterprise application-aware firewalls
sponsored by SonicWALL
EGUIDE: The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

Next-Generation Firewall
sponsored by SonicWALL
WHITE PAPER: It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

How Application Intelligence and Control enables network security in the wake of Web 2.0, Cloud Computing and Mobility
sponsored by SonicWALL
EBOOK: This paper explores how innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into corporate and government networks.
Posted: 25 Feb 2011 | Published: 25 Feb 2011

SonicWALL

How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Trend Micro, Inc.

BGMX Retail Solutions Case Study
sponsored by SonicWALL
CASE STUDY: BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Next Generation Web Application Firewalls (NG-WAF)
sponsored by Imperva
WHITE PAPER: This paper describes Imperva's vision for the next generation of WAFs. It details Web application security problems and solutions today, and gives perspectives on the future.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Control SSL to Prevent Attacks & Information Leaks
sponsored by BlueCoat
DATA SHEET: By providing SSL visibility and control, Blue Coat offers a complete data leakage solution with its ProxySG family of secure proxy appliances. Blue Coat ProxySG solution protects against a wide range of risks, regardless of whether the traffic is encrypted.
Posted: 11 May 2010 | Published: 11 May 2010

BlueCoat

10 Cool Things Your Firewall Should Do
sponsored by SonicWALL
WHITE PAPER: This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.
Posted: 18 Jan 2010 | Published: 18 Nov 2008

SonicWALL

VoIP Firewall Solution Brief
sponsored by SonicWALL
PRODUCT OVERVIEW: Like all IP traffic, VoIP can be prone to security threats from internal and external attacks and application vulnerabilities. However, potential latency, jitter, packet loss and echo due to an underperforming firewall could significantly degrade communications. The ideal solution would provide comprehensive security that introduces no latency.
Posted: 13 Jan 2010 | Published: 13 Jan 2010

SonicWALL

Securing the Foundation of Information Technology (IT) Systems
sponsored by Trusted Computer Solutions
WHITE PAPER: This paper explains how there is no one process to make any organization 100% secure, but establishing a company-wide security policy based on industry-standard best practices is a good place to start. Many of these best practices can be implemented as part of the operating system assessment and lock down process.
Posted: 12 Jan 2010 | Published: 12 Jan 2010

Trusted Computer Solutions

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
PRESENTATION TRANSCRIPT: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.
Posted: 07 Jan 2010 | Published: 07 Jan 2010

Faronics

To Block or Not. Is that the Question?
sponsored by Palo Alto Networks
WHITE PAPER: This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement.
Posted: 05 Jan 2010 | Published: 01 Dec 2009

Palo Alto Networks

Survival Guide: Securing Networks without Borders Show
sponsored by Cisco Systems, Inc.
WEBCAST: In today’s era of borderless networks, minimizing your exposure to outside threats is more crucial than ever. In this video, discover how to reduce the potential attack surfaces available to data thieves without buying any new hardware or software. Learn the latest methods employed by hackers to gain access to your network and how to eliminate them
Posted: 20 Nov 2009 | Premiered: Nov 20, 2009

Cisco Systems, Inc.

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

Understanding Why Web Application Security is Critical to Business
sponsored by Sirius Computer Solutions
WHITE PAPER: This paper compiles clients’ frequently asked questions about Web application security. These questions are answered by security experts from Sirius and IBM. The goal is to help you understand the issues surrounding Web application security; so you can better prepare your organization for a security breach.
Posted: 13 Oct 2009 | Published: 01 Sep 2009

Sirius Computer Solutions

Vyatta System Quick Start Guide
sponsored by Vyatta Inc.
PRODUCT LITERATURE: Vyatta delivers the features, performance, and reliability of an enterprise-class secure router with the added benefits of flexible deployment options, freedom to integrate applications, and the economic advantages of commodity hardware and components. Read this manual to learn more about the Vyatta system and how easy it is to try it out.
Posted: 22 Sep 2009 | Published: 22 Feb 2009

Vyatta Inc.

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Firewall Solutions for Small Business
sponsored by Cisco Systems, Inc.
WHITE PAPER: The ideal firewall solutions for small business integrate a hardware firewall with software controls into a comprehensive security solution that includes virtual private network (VPN) support, antivirus, antispam, antispyware, and content filtering capabilities.
Posted: 14 Aug 2009 | Published: 14 Aug 2009

Cisco Systems, Inc.

Essential Guide to Threat Management
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 19 Mar 2009 | Published: 19 Mar 2009

Information Security Magazine

Meeting Today's Security Challenges with End-to-end Access Control
sponsored by Juniper Networks, Inc.
WHITE PAPER: This White Paper explores how Juniper Unified Access Control (UAC) solution deployed with Juniper EX-series switches delivers a comprehensive network access control (NAC) solution.
Posted: 19 Dec 2008 | Published: 01 Mar 2008

Juniper Networks, Inc.

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper by Juniper Networks describes the top five networking access control challenges that companies like yours are facing and solutions that they are deploying today.
Posted: 19 Dec 2008 | Published: 01 Apr 2008

Juniper Networks, Inc.
76 - 100 of 112 Matches Previous Page    2 3 4 5    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement