Network Firewall Appliances Reports

Malware Attacks Demand a New Malware Defense Approach
sponsored by TechTarget Security
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

TechTarget Security

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

How the Basics of Network Security Have Evolved
sponsored by Fortinet, Inc.
EGUIDE: In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
Posted: 09 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

Meeting Branch Office Business Needs for Security and Networking
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE: Download this white paper and discover an ideal branch-office security strategy that provides fast and secure site-to-site VPN connections. You will also learn about effective tactics that help stop viruses, worms, Spyware and other threats.
Posted: 30 Aug 2006 | Published: 01 Jul 2006

Juniper Networks, Inc.

Next-generation capabilities of enterprise application-aware firewalls
sponsored by SonicWALL
EGUIDE: The emergence of Web 2.0 technologies has prompted the need for a firewall that is able to distinguish between different risks within a website's features and content, and apply policies accordingly. This expert tip discusses the new generation of "application-aware" firewalls that has emerged to deal with today's application-centric threats.
Posted: 07 Mar 2011 | Published: 07 Mar 2011

SonicWALL

DNS Firewalls and Defense Tactics
sponsored by Infoblox
EGUIDE: Gain an in-depth look at today's most popular domain name system (DNS) attacks and the defense tactics against them. In addition, uncover how a DNS firewall can help keep your organization safe.
Posted: 18 Feb 2013 | Published: 18 Feb 2013

Infoblox

Next-generation firewalls are mainstream: What to expect
sponsored by Palo Alto Networks
EGUIDE: Today, as enterprises increasingly implement next-generation firewalls, there are a number of kinks that must be addressed. In this e-guide, explore the ins and outs of next-generation firewalls including the potential implementation headaches and how to overcome them.
Posted: 19 Mar 2012 | Published: 15 Mar 2012

Palo Alto Networks

Virtualization Security: Protecting Virtualized Environments
sponsored by TechTarget ComputerWeekly.com
BOOK: This extract from the book Virtualization Security, includes a 30% discount for Computer Weekly readers.
Posted: 20 Feb 2013 | Published: 20 Feb 2013

TechTarget ComputerWeekly.com

How Security is Changing to Support Virtualization and Cloud Computing
sponsored by Trend Micro, Inc.
WHITE PAPER: In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data.
Posted: 17 Feb 2011 | Published: 17 Feb 2011

Trend Micro, Inc.

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
PRESENTATION TRANSCRIPT: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.
Posted: 07 Jan 2010 | Published: 07 Jan 2010

Faronics