Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Solid State Firewall Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Solid State Firewall Appliances Reports
 
Combating Today’s Security Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.
Posted: 20 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Endpoint Security IT Decision Center Handbook 2
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

SearchSecurity.com

Integrate Firewalls and Increase Visibility Anywhere with User-ID Link
sponsored by Palo Alto Networks
WHITE PAPER: This white paper highlights a security solution that integrates existing enterprise directory services with next-generation firewalls so application activity and policies are linked directly with users or groups. Read on to learn how user-based analysis, reporting, and forensics can improve visibility and protection.
Posted: 24 Jan 2014 | Published: 12 Nov 2012

Palo Alto Networks

Buyers guide to next-gen firewalls
sponsored by Palo Alto Networks
WHITE PAPER: In this resource, uncover a buyers guide for next-generation firewalls that details all the must-have functions in order to ensure optimum network security. Click now to see how to choose the right solution for your organization's needs.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

Palo Alto Networks

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: This paper by Juniper Networks describes the top five networking access control challenges that companies like yours are facing and solutions that they are deploying today.
Posted: 19 Dec 2008 | Published: 01 Apr 2008

Juniper Networks, Inc.

CISO Guide to Next Generation Threats
sponsored by FireEye
WHITE PAPER: The only way to protect yourself against next generation threats is to have next generation protection. Traditional firewalls, IPS, anitivirus, and signature based systems are still useful against known threats, but they don't stand a chance against new ones
Posted: 17 May 2011 | Published: 16 May 2011

FireEye

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

10 Cool Things Your Firewall Should Do
sponsored by SonicWALL
WHITE PAPER: This document explains 10 things the firewall should do and describes the origins of the Application Firewall which can manage and control data and applications that pass through the Firewall.
Posted: 18 Jan 2010 | Published: 18 Nov 2008

SonicWALL
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement