Search Results for: firewall webcast

How a next-generation firewall prevents application-layer attacks
The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

TechTarget Security

Cisco ASA 5500 Series Adaptive Security Appliance
In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.

Cisco Systems, Inc.

Thwarting Sophisticated Attacks with Today’s Firewalls
This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).

TechTarget Security

Presentation Transcript: The New Branch Office - Simply Connected
This is a presentation transcript of a webcast dedicated to learning about branch offices: the challenges, solutions, and how to keep them secure.

Juniper Networks, Inc.

Aviatrix Systems Video 2
How can you simplify the security of your cloud applications while reducing costs? Watch this webcast, which features leaders from Aviatrix, to find out.

TOPICS: .NET
Aviatrix Systems

Web application firewalls: How they can help protect customers
In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.

Astaro

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.

Juniper Networks, Inc.

How can organizations get control over privileged identity management?
Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information

One Identity

Security Products for Protection: Endpoint and Anti-Malware
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

Carbon Black

Presentation Transcript: Integrating Cloud into Your Infrastructure Planning
So you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.

GoGrid