IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Unified Threat Management

RSS Feed    Add to Google    Add to My Yahoo!
Unified Threat ManagementReports
 
6 Tips for Choosing a UTM Solution
sponsored by Astaro
WHITE PAPER: Organizations today are replacing multiple, outdated and costly security appliances with a more simplified, single unified threat management (UTM) solution. Which one is best for your business? In this paper, gain key advice on how to choose a comprehensive UTM solution.
Posted: 13 Jan 2012 | Published: 13 Jan 2012

Astaro

Botnets: The dark side of cloud computing
sponsored by Astaro
WHITE PAPER: Botnets pose a serious threat to your network and business, rivaling the power today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. View this paper to explore how to protrect against the risk of botnets with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 06 Apr 2012

Astaro

Unified Threat Management Guide for Managers
sponsored by Information Security Magazine
JOURNAL ARTICLE: It's a firewall, it's an IPS, it's antivirus, it's antispam... but is it right for you?
Posted: 24 Aug 2006 | Published: 01 Jun 2006

Information Security Magazine

MicroScope September 2011: A special issue examining the security market
sponsored by MicroScope
EZINE: Security has remained a good market for the channel to be involved in with the threats continuing to evolve and customers being forced to keep their budgets high in order to maintain protection. Not only are the threats evolving but so are the challenges to channel customers. Continue reading this e-zine to learn more.
Posted: 16 Sep 2011 | Published: 21 Oct 2011

MicroScope

Understanding and Selecting a Data Loss Prevention Solution
sponsored by Websense, Inc.
WHITE PAPER: Data Loss Prevention has matured considerably since the release of the first version of this report three years ago. Back then, the market was dominated by startups with only a couple major acquisitions by established security companies.The entire market was probably smaller than the leading one or two providers today.
Posted: 13 Jan 2011 | Published: 13 Jan 2011

Websense, Inc.

Unified Threat Management (UTM) Solutions
sponsored by SonicWALL
WHITE PAPER: This series of technical briefs examines the key factors you need to consider regarding unified threat management (UTM) solutions as they impact security, performance, management, and consolidation.
Posted: 05 Dec 2007 | Published: 01 Dec 2007

SonicWALL

Advantages of Integrated Messaging Security
sponsored by Symantec Corporation
WHITE PAPER: This paper shows you how selecting an integrated messaging security solution reduces wasted IT effort, allows centralized management and permits a single support resource without the finger-pointing that can happen in a multi-vendor environ...
Posted: 03 Aug 2007 | Published: 03 Aug 2007

Symantec Corporation

Web Filtering: An Essential Part of a Consolidated Security System
sponsored by Fortinet, Inc.
WHITE PAPER: In spite of the billions of dollars invested in security, web-borne threats are still on the rise. Enterprises need a security system that can enforce granular web access policies on all devices used to access the web from inside and outside the network perimeter.
Posted: 01 Aug 2011 | Published: 29 Jul 2011

Fortinet, Inc.

Presentation Transcript: Best Practices for Implementation of an Intrusion Prevention and Intrusion Detection Systems
sponsored by Dell SecureWorks
PRESENTATION TRANSCRIPT: View this presentation transcript to explore the benefits of deploying IPS & IDS, challenges and considerations when implementing IPS & IDS, features to look for when selecting a device, deployment methodologies and more.
Posted: 22 Aug 2011 | Published: 22 Aug 2011

Dell SecureWorks

Attack Mitigation System
sponsored by Radware
WHITE PAPER: Radware’s Attack Mitigation System (AMS) is a real-time network and application attack mitigation solution that protects the application infrastructure against network and application downtime, application vulnerability exploitation, malware spread, information theft, web service attacks and web defacement. View now to learn more.
Posted: 10 Oct 2011 | Published: 10 Oct 2011

Radware
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement