Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Network Firewall Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Network Firewall AppliancesReports
 
The Next Generation of Data-Driven Security
sponsored by MapR Technologies
WHITE PAPER: In this in-depth white paper, get the facts on how new adaptive algorithms like Machine Learning and Big Data can identify security risks that other outdated techniques simply couldn't.
Posted: 02 Sep 2014 | Published: 30 Jun 2014

MapR Technologies

Integrate Firewalls and Increase Visibility Anywhere with User-ID Link
sponsored by Palo Alto Networks
WHITE PAPER: This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection.
Posted: 24 Jan 2014 | Published: 12 Nov 2012

Palo Alto Networks

Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls
sponsored by Cisco Systems, Inc.
WHITE PAPER: Read this exclusive paper to learn about how context-aware and adaptive next-generation firewalls can help keep your IT environment secure as more mobile devices and technology makes its way into your corporate network.
Posted: 24 Jun 2014 | Published: 24 Jun 2014

Cisco Systems, Inc.

Technical guide on Web Security Gateways
sponsored by SearchSecurity.com
EBOOK: Malicious code and the sites hosting it are constantly changing; making it difficult for filtering technologies and signature-based antivirus programs to keep pace with the proliferation of today's' evolving threats.
Posted: 28 Apr 2011 | Published: 28 Apr 2011

SearchSecurity.com

Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT: This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014

Imperva

Firewalls Put to the Test
sponsored by Cisco Systems, Inc.
WHITE PAPER: Keeping your network secure is crucial in today's business world. This exclusive resource examines how some of the top firewall solutions on the market today fared when put to the test. Read on to learn more.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Cisco Systems, Inc.

Control SSL to Prevent Attacks & Information Leaks
sponsored by BlueCoat
DATA SHEET: By providing SSL visibility and control, Blue Coat offers a complete data leakage solution with its ProxySG family of secure proxy appliances. Blue Coat ProxySG solution protects against a wide range of risks, regardless of whether the traffic is encrypted.
Posted: 11 May 2010 | Published: 11 May 2010

BlueCoat

Alternatives for Securing Virtual Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this white paper, we will examine the virtualization issues that challenge today’s data centers and discuss their best options for securing virtual networks.
Posted: 29 Mar 2011 | Published: 28 Mar 2011

Juniper Networks, Inc.

Understanding the Value behind Enterprise Application-Aware Firewalls
sponsored by Dell SonicWALL
EGUIDE: This expert resource examines the value of enterprise application-aware firewalls and why they are in such high-demand among users.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

Dell SonicWALL

Web application firewalls: How they can help protect customers
sponsored by Astaro
EGUIDE: In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Astaro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement