IT Management  >   Systems Operations  >   Security  >   Internet Security  >  

Firewall Management

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Firewalls, Firewall Security, Fire Wall, Network Firewall Management
DEFINITION: Firewall Builder, also known as Fwbuilder, is a vendor-neutral configuration and management application for firewalls. The application was created for the Linux operating system; versions are available for other operating systems, including Windows and Macintosh. According to Fwbuilder's user guide, both network administrators and hobbyists managing home-based local area networks (LANs) can simplify  … 
Definition continues below.
Firewall Management Reports
101 - 125 of 175 Matches Previous Page  |  Next Page
Expert E-Book: Data Security and the Cloud
sponsored by
EBOOK: This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

E-Book: Technical Guide on Web Application Firewalls
sponsored by
EBOOK: Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

Five Critical Rules for Firewall Management
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organisations improve their firewall management.
Posted: 06 Sep 2011 | Published: 06 Sep 2011

Dell SecureWorks

Magic Quadrant for Network Intrusion Prevention Systems
sponsored by McAfee.
ANALYST REPORT: This research paper analyzes the market, evolution, and use cases of network-based IPS. View now to explore IPS vendors in the market, and discover where they rank in Gartner’s Magic Quadrant.
Posted: 15 Aug 2011 | Published: 06 Dec 2010


The New Status Quo: Zero-Day and Targeted APT Attacks
sponsored by FireEye
VIDEO: During the webcast, Dr. Wang of Forrester Research and Ashar Aziz of FireEye will provide insight on data breach incidents and how to protect your company from cybercrime.
Posted: 11 Jul 2011 | Premiered: 08 Jul 2011


Resource Protection in Virtualized Infrastructures
sponsored by Intel
WHITE PAPER: While virtualization brings a variety of infrastructure advantages, there are evolving security concerns that must be addressed. Access this exclusive resource for a detailed analysis of the security concerns associated with server virtualization.
Posted: 13 Jun 2011 | Published: 01 Aug 2009


Five Critical Rules for Firewall Management: Lessons from the Field
sponsored by Dell SecureWorks
WHITE PAPER: This white paper will teach you five things to consider when managing your firewall, and will present you with real life examples of how these five things have helped other organizations improve their firewall management.
Posted: 09 Jun 2011 | Published: 08 Jun 2011

Dell SecureWorks

Cloud-based Enterprise-class Wi-Fi Management
sponsored by Aerohive Networks
WHITE PAPER: After you’ve enabled your people to work from virtually anywhere, you need to maintain essential security and control under the constant pressure to drive down costs. Uncover a cloud-based management solution that provides all the features and functionality of a behind-the-wall firewall network management system without the hassles.
Posted: 01 Jun 2011 | Published: 31 May 2011

Aerohive Networks

Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This white paper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 16 May 2011 | Published: 29 Oct 2010


CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: This white paper will tell you about a new security solutions and the need to your business to update it's security solutions to a Next-Generation security system.
Posted: 09 May 2011 | Published: 09 May 2011


Application Brief: Multi-tenant Cloud Security
sponsored by Vyatta Inc.
APPLICATION NOTE: Multitenant cloud security is a critical concern for cloud service providers and end users alike. One significant challenge involves maintaining compliance to corporate and regulatory standards, while leveraging the shared infrastructure model’s cost benefits and improved operational efficiency.
Posted: 11 Apr 2011 | Published: 11 Apr 2011

Vyatta Inc.

Key Considerations for Adopting Infrastructure as a Service (IaaS)
sponsored by Dell Software
EGUIDE: In this expert e-guide, find answers to four key Web application security questions. Also discover best practices for application-level firewall selection and deployment.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

Dell Software

10 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: Users continue to adopt new applications and technologies – and the threats carried by them. In some organizations, obstructing the adoption of new technologies can be a career-limiting move.
Posted: 25 Mar 2011 | Published: 24 Mar 2011

Palo Alto Networks

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
sponsored by ESET
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011


Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011


SonicWALL PCI Compliance Solution Brief
sponsored by SonicWALL
WHITE PAPER: The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
Posted: 14 Feb 2011 | Published: 14 Feb 2011


Backup Mobile and Remote Users Securely, With or Without a VPN
sponsored by Copiun
WHITE PAPER: This whitepaper examines the challenges with backing up corporate data on these remote users’ PCs and describes Copiun’s Constant Access Gateway option which allows IT organizations to securely backup remote and mobile users without opening any firewall ports or placing the backup server in the DMZ.
Posted: 17 Jan 2011 | Published: 17 Jan 2011


Don’t Fire Your Firewall
sponsored by AT&T Corp
WEBCAST: Listen to this webcast to learn how AT&T Security Device Management (SDM) can help you control complexity, cost and compliance by monitoring your on-premise security hardware and software.
Posted: 07 Jan 2011 | Premiered: Jan 4, 2011

AT&T Corp

Top 10 Tips to Keep Your Small Business Safe
sponsored by Trend Micro, Inc.
WHITE PAPER: Read this paper to learn the top ten ways to protect your small business against web threats. Learn what you need to know about security and what are the key elements to address.
Posted: 19 Nov 2010 | Published: 17 Nov 2010

Trend Micro, Inc.

Take Back Control: Increase Security, Empower Employees, Protect the Business
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.

File Security: Audit and Protect Critical Files
sponsored by Imperva
WHITE PAPER: Read this paper to learn how Imperva SecureSphere File Security products deliver real-time file monitoring, auditing, security, and user rights management for files stored on file servers and network attached storage (NAS) devices.
Posted: 30 Aug 2010 | Published: 30 Aug 2010


Polycom UC Intelligent Core: Scalable Infrastructure for Distributed Video
sponsored by Polycom, Inc.
WHITE PAPER: Video is leaving the dedicated video conference room and becoming a standard communication tool and part of the individual's daily workflow. In turn, this trend is having a profound impact on the scalability requirements of the visual communication system.
Posted: 27 Aug 2010 | Published: 27 Aug 2010

Polycom, Inc.

Integrating IBM WebSphere Portal and IBM Mashup Center Software
sponsored by IBM
WHITE PAPER: This white paper outlines the potential integration options between IBM WebSphere® Portal and IBM Mashup Center software. Organizations can implement these integration options to achieve greater flexibility while lowering costs.
Posted: 17 Aug 2010 | Published: 06 Mar 2009


Presentation Transcript: Integrating Cloud into Your Infrastructure Planning
sponsored by GoGrid
PRESENTATION TRANSCRIPT: So you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.
Posted: 12 Aug 2010 | Published: 12 Aug 2010


KineticD Security
sponsored by KineticD
WHITE PAPER: The purpose of this white paper is to demonstrate how KineticD meets and exceeds its clients' demands and expectations for the security of its online backup SaaS offering.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

101 - 125 of 175 Matches Previous Page    3 4 5 6 7    Next Page
FIREWALL MANAGEMENT DEFINITION (continued): …  management tasks with the application. Fwbuilder supports the OpenBSD Packet Filter, Cisco PIX Series security devices, and iptables and ipfilter Linux utilities. Fwbuilder allows for the simultaneous management of multiple firewalls on multiple servers. Programming components called policy compilers facilitate fine-tuning of firewall policy rules without the need for the administrator to remember all of the details for each firewall or server. The policy compilers also ensure that firewalls are "sane" -- that is, that there are no contradictions or errors that would interfere with the intended … 
Firewall Management definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement