IT Management  >   Systems Operations  >   Security  >   Internet Security  >  

Firewall Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Firewalls, Firewall Security, Fire Wall, Network Firewall Management
DEFINITION: Firewall Builder, also known as Fwbuilder, is a vendor-neutral configuration and management application for firewalls. The application was created for the Linux operating system; versions are available for other operating systems, including Windows and Macintosh. According to Fwbuilder's user guide, both network administrators and hobbyists managing home-based local area networks (LANs) can simplify  … 
Definition continues below.
Firewall Management Reports
101 - 125 of 206 Matches Previous Page  |  Next Page
Web Application Firewalls: Patching, SDLC Key for Security, Compliance
sponsored by
EGUIDE: In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

How Traditional Firewalls Fail Today's Networks — And Why Next-Generation Firewalls Will Prevail
sponsored by Dell, Inc.
WHITE PAPER: Learn exactly where traditional firewalls fall short, and discover how next-generation firewalls provide excellent network performance without compromising security. Read this e-book and uncover where traditional firewalls fall short, and how next-generation firewalls fill those gaps.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell, Inc.

Threat prevention techniques: How to build a strong network
sponsored by
EGUIDE: Consult this expert E-Guide to learn how you can develop best practices for threat management and how you can build a strong network. Find out tips from the experts on how you can build a foundation for complete threat protect ion by consulting this guide now.
Posted: 25 Oct 2012 | Published: 18 Oct 2012

E-Guide: Configure Outbound Firewall Rules for Data Protection
sponsored by
EGUIDE: A new form of firewall was recently developed in order to withstand more sophisticated threats. Consult this expert E-guide to learn more about the value of application firewalls and how they can benefit the security of your business.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by
ESSENTIAL GUIDE: This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012

Information Security Magazine - February 2013
sponsored by
EZINE: In this month's issue of Information Security magazine, discover expert advice for navigating the risks and dangers of increased mobility and the bring your own device (BYOD) trend. Learn how you can avoid BYOD pitfalls, improve security with the right policy, and more.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

How a Next-Generation Firewall Prevents Application-Layer Attacks
sponsored by Sophos, Inc.
EGUIDE: This expert E-Guide explores the value of next-generation firewalls (NGFWs) in preventing application-layer threats, such as SQL-injections and buffer-overflow attacks. Inside, discover NGFW opportunities and challenges – read on to learn more.
Posted: 24 Jan 2013 | Published: 24 Jan 2013

Sophos, Inc.

E-Guide: Building Risk Resilience in the Threat Landscape
sponsored by CA Technologies.
EGUIDE: This expert e-guide explores how next-generation firewalls (NGFW) can overcome the limitations of traditional firewall solutions. Read on to discover key features, functions, and benefits that NGFWs can offer your organization. Also inside, find key tips for building risk resilience.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

CA Technologies.

E-Guide: Next-Gen Firewall vs. the Competition - Which is Better?
sponsored by Dell SonicWALL
EGUIDE: Uncover the best strategies for network protection by consulting this informative e-guide for an evaluation of next-generation firewalls (NGFWs) against other network security solutions, including unified threat management products and intrusion prevention systems.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

Dell SonicWALL

Bringing the Network Perimeter Back From the 'Dead'
sponsored by Symantec Corporation
EGUIDE: There's considerable debate today regarding the future of the perimeter for endpoint security. Consult this expert e-guide now to explore the role of the modern perimeter and discover two major benefits that the perimeter can offer your organization – read on to learn more.
Posted: 03 Dec 2012 | Published: 03 Dec 2012

Symantec Corporation

E-Guide: Firewall Network Security: Thwarting Sophisticated Attacks
sponsored by Dell SonicWALL
EGUIDE: Consult this expert e-guide for a concise overview of the role that firewalls play in network security, as well as a description of the most sophisticated attack that a firewall can guard against. Discover the extent of firewall coverage by clicking through now.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Dell SonicWALL

Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
sponsored by Dell SonicWALL
EGUIDE: This is the third piece in's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Next Generation Firewalls: Assessing the Business/Technology Issue
sponsored by Dell SonicWALL
EGUIDE: In the first of's three-part guide on selecting Next Generation Firewall products, this document takes a look at the business and technology issues associated with them and provides expert guidance on the benefits you can reap by taking advantage of the various types of Next Generation Firewall solutions.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Increasing Security Throughput with Palo Alto Networks & Brocade
sponsored by Copper River IT
WHITE PAPER: The growing volume of information entering and leaving a data center often exceeds a single network's capacity. Read this white paper to learn how you can maintain data center speeds without sacrificing your security.
Posted: 05 Oct 2012 | Published: 04 Oct 2012

Copper River IT

2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

GFI Reviews and awards
sponsored by GFI LanGuard
WHITE PAPER: Access this exclusive resource to read reviews and uncover the awards given to one particular network security and vulnerability scanner by 80 different websites and critics. Learn why this award-winning solution is trusted by so many organizations across the globe!
Posted: 05 Sep 2012 | Published: 05 Sep 2012

GFI LanGuard

Webroot Secure Anywhere - Endpoint Protection
sponsored by Webroot
WHITE PAPER: Threats are becoming more sophisticated and frequent than ever before, as a result businesses require a revolutionary approach to endpoint malware protection. Access this informative white paper to learn how Webroot is using its services to keep security up-to-date and effective.
Posted: 06 Aug 2012 | Published: 06 Aug 2012


Application Security in the Cloud with BIG-IP ASM
sponsored by F5 Networks
WHITE PAPER: Access this white paper to discover a high-performance web application firewall that provides a strategic point of control within the infrastructure from which enterprises can adapt to changing conditions. Learn how your organization can benefit from this cloud-ready solution, offering cloud security for virtualized applications.
Posted: 03 Aug 2012 | Published: 03 Aug 2012

F5 Networks

Closing the Back Door on Network Application Vulnerabilities
sponsored by Sophos, Inc.
WHITE PAPER: This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Sophos, Inc.

Palo Alto Networks in the Data Center: Eliminating Compromise
sponsored by Palo Alto Networks
WHITE PAPER: This resource explores best practices for data center network security. Learn how to protect your business without compromising flexibility and application availability.
Posted: 20 Apr 2012 | Published: 20 Apr 2012

Palo Alto Networks

Protecting your Network and Data Center with Next-Gen Firewalls
sponsored by Palo Alto Networks
EGUIDE: Learn how your organization can take advantage of next-generation firewalls. This resource provides clarity on this popular security solution so you can determine which features are right for your needs.
Posted: 13 Apr 2012 | Published: 13 Apr 2012

Palo Alto Networks

Web application firewalls: How they can help protect customers
sponsored by Astaro
EGUIDE: In this E-Guide from, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.
Posted: 04 Apr 2012 | Published: 04 Apr 2012


Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by
EZINE: In the April edition of’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

Next-generation firewalls are mainstream: What to expect
sponsored by Palo Alto Networks
EGUIDE: Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.
Posted: 19 Mar 2012 | Published: 15 Mar 2012

Palo Alto Networks

Application-Aware Firewalls
sponsored by Juniper Networks, Inc.
EGUIDE: This IT Checklist outlines the capabilities application-aware firewalls can and should have. It also can guide you to discover the criteria your firewall should have to meet your security needs.
Posted: 02 Mar 2012 | Published: 02 Mar 2012

Juniper Networks, Inc.
101 - 125 of 206 Matches Previous Page    3 4 5 6 7 8    Next Page
FIREWALL MANAGEMENT DEFINITION (continued): …  management tasks with the application. Fwbuilder supports the OpenBSD Packet Filter, Cisco PIX Series security devices, and iptables and ipfilter Linux utilities. Fwbuilder allows for the simultaneous management of multiple firewalls on multiple servers. Programming components called policy compilers facilitate fine-tuning of firewall policy rules without the need for the administrator to remember all of the details for each firewall or server. The policy compilers also ensure that firewalls are "sane" -- that is, that there are no contradictions or errors that would interfere with the intended … 
Firewall Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement