IT Management  >   Systems Operations  >   Security  >   Internet Security  >  

Network Firewall Management

RSS Feed    Add to Google    Add to My Yahoo!
Network Firewall Management Reports
 
Malware Attacks Demand a New Malware Defense Approach
sponsored by SearchSecurity.com
EGUIDE: Customized, targeted malware attacks require new defense measures beyond those currently in place. This e-guide from SearchSecurity.com offers advice on protecting your organization from these new threats. View now to learn more!
Posted: 19 Jun 2013 | Published: 19 Jun 2013

SearchSecurity.com

NGFW Critical to SMB Network
sponsored by Dell Software
WHITE PAPER: In today's sophisticated and rapidly changing threat landscape, traditional firewall could be increasing your security risks rather than alleviating them. Next-Generation Firewalls dramatically improve protection over traditional firewalls.
Posted: 08 Jan 2013 | Published: 08 Jan 2013

Dell Software

Why Legacy Solutions Can't Defend Your Enterprise from Mobile Threats
sponsored by Zimperium
WHITE PAPER: This exclusive white paper takes an in-depth look at the changing enterprise mobility landscape. It offers a look at current mobile security strategies and the evolution of them in years to come. Read on to learn more.
Posted: 21 Nov 2014 | Published: 21 Nov 2014

Zimperium

How traditional firewalls fail
sponsored by Dell Software
WHITE PAPER: Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.
Posted: 20 Dec 2012 | Published: 20 Dec 2012

Dell Software

Promise Healthcare case study
sponsored by Dell Software
WHITE PAPER: Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.
Posted: 20 Aug 2014 | Published: 01 Apr 2014

Dell Software

Protect Your Web Applications from the OWASP Top 10 Security Threats
sponsored by Imperva
WHITE PAPER: This white paper introduces a web application firewall (WAF) that protects companies' websites all over the world from a myriad of threats, including the OWASP Top 10, DDoS attacks, site scraping, and online fraud.
Posted: 08 Jul 2014 | Published: 31 Dec 2013

Imperva

Why threat intelligence is critical for next generation firewalls
sponsored by Dell Software
WHITE PAPER: A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.
Posted: 20 Aug 2014 | Published: 20 Aug 2014

Dell Software

2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER: Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

Symantec Corporation

MicroScope May 2014: An issue covering changes in the security market
sponsored by MicroScope
EZINE: An issue highlighting the changing security landscape and the opportunities for resellers.
Posted: 07 May 2014 | Published: 08 May 2014

MicroScope

Closing the Back Door on Network Application Vulnerabilities
sponsored by Sophos, Inc.
WHITE PAPER: This resource explains how SMBs can benefit from using unified threat management (UTM) to protect their web servers.
Posted: 03 Jul 2012 | Published: 03 Jul 2012

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement