Network Firewalls
By: Information Security Magazine View more from Information Security Magazine >>
Download this next:
Running Cisco Firepower Virtual Firewall on EndaceProbe
By: Endace
Type: Product Demo
Your network, like every network, is in danger of being attacked by the many emerging and complex threats in the cyber landscape.
So, how can you augment your defense measures?
This video introduces one avenue toward enhanced network security: running Cisco Firepower Virtual Firewall on EndaceProbe.
View now to unlock the demo.
These are also closely related to: "Network Firewalls"
-
E-Guide: Configure Outbound Firewall Rules for Data Protection
By: TechTarget Security
Type: eGuide
A new generation of application aware firewalls has been developed to ward off more sophisticated threats. While firewalls have been a form of security networks for nearly 25 years, modern threats are creating the need to update traditional firewall practices.
Consult this expert E-guide to learn more about the transformation of firewalls and how a next-generation firewall can improve your businesses security.
-
Thwarting Sophisticated Attacks with Today’s Firewalls
By: TechTarget Security
Type: eGuide
IT managers today are questioning the effectiveness of firewalls as network perimeters continue to expand and new Web 2.0 threats emerge. This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewalls (NGFWs) and unified threat management (UTM).
Find more content like what you just read:
-
Analyst report: Network firewall landscape
By: Palo Alto Networks
Type: Gartner Magic Quadrant
By 2026, Gartner predicts, more than 60% of businesses will have more than one type of firewall deployment. To help organizations select the network firewalls that can best meet their needs, this Gartner Magic Quadrant report overviews the market and vendors. Read on to compare 17 firewall providers.
-
Tools for supporting your security analysts
By: Endace
Type: Product Overview
To ensure that your security incident investigations are successful, your analysts need access to definitive evidence. Download this overview to learn how, by leveraging Cisco and Endace tools, you can deliver that evidence to your analysts.
-
Cisco Catalyst: Future of secure, resilient networking
By: Zones, Inc.
Type: eBook
Cisco Catalyst switches are designed to withstand rising connectivity demands. Featuring AI, ML, security, and efficiency, Catalyst optimizes networks. Read this white paper to discover how Catalyst's modular components create an ecosystem that reduces complexity and downtime.
-
E-Book: Technical Guide on Web Application Firewalls
By: TechTarget Security
Type: eBook
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
-
Strengthen Your Incident Response with Endace and Cisco
By: Endace
Type: Product Overview
When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.
-
How Cisco helped centralize and streamline Qdoba's security
By: Cisco
Type: Case Study
Qdoba Mexican Eats is connected and protected by Cisco Secure. Hear Gary Burgess, Director of Infrastructure and Security at Qdoba, discuss how a SASE solution that combines Cisco Umbrella cloud-delivered security and Meraki’s cloud-managed networking keeps connectivity reliable and secure.
-
How to streamline cloud security and embrace SASE
By: Cisco
Type: White Paper
Cisco Umbrella helps you simplify, streamline, and scale your security. With flexible, cloud-delivered security, Umbrella is the heart of the Cisco SASE architecture. It combines multiple security functions into one solution, so you can extend data protection to devices, remote users, and distributed locations anywhere. Read on to learn more.
-
E-Guide: Using web application firewalls to ease compliance efforts
By: TechTarget Security
Type: eGuide
When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.
-
Analyzing organizational cyber resilience
By: Cisco
Type: Analyst Report
In this cybersecurity report, you will discover what security resilience means, why it’s important, and how businesses are ranking their own resilience. You will also find actionable insights to strengthen your cybersecurity strategy amidst the rapid and often disruptive changes of today’s business environment.
-
Zero Trust at Scale: A Look Inside Cisco’s Zero Trust Integration Model
By: Cisco
Type: White Paper
In this guide, you will learn why Cisco invested in Zero Trust when remote work initially gained foothold, how Cisco Zero Trust facilitates stakeholder engagement and buy-in, and more.
-
The impact of compute-intensive workloads on network infrastructure
By: Panduit
Type: White Paper
In this white paper, join Cisco and Panduit as they describe some of the trends in data center connectivity and the impact this compute-intensive workload have on cabling and network infrastructure design with corresponding deployment guidelines.
-
Top 10 networking stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.
-
2023 analyst report: Network management market
By: Auvik Networks, Inc.
Type: Analyst Report
In this 2023 analyst report, find out how 27 network management tools stack up against each other.
-
Analyzing the business impact of Cisco Duo
By: Cisco
Type: Analyst Report
Cisco Secure Access by Duo uses a multi-layered approach to secure access to applications in the cloud or on-premises with multifactor authentication, single sign-on, and device posture checks. For a complete look at Duo's value to a business, get the key financial data points in The TEI of Cisco Duo study.
-
How can you augment your firewall’s abilities?
By: Integrity360
Type: Blog
As cyberthreats increase in complexity and number, firewalls present to businesses the opportunity to block threats at the network perimeter. To augment your firewall’s abilities, Integrity360 has developed Managed Next Generation Firewall Service. Explore this case study to explore the service’s offerings.
-
The technological evolution of IT industry leaders: Part one
By: TechTarget ComputerWeekly.com
Type: eGuide
This first part of this e-guide explores the technological evolution of Oracle, Cisco and Dell throughout the past two decades, including the technologies that have risen to the forefront, from real-time analytics and data management to Cisco's edge computing ambitions.
-
Analyst report: SD-WAN market overview
By: Palo Alto Networks
Type: Gartner Magic Quadrant
To compare 14 top SD-WAN vendors – including Fortinet, Palo Alto Networks and VMware – take a look through this Gartner Magic Quadrant report.
-
An economic analysis of Cisco Duo
By: Cisco
Type: Forrester Total Economic Impact Report
Through four customer interviews and data aggregation, Forrester concluded that Cisco has the following three-year financial impact; view the infographic for a summary of solution benefits, user quotes, and the real ROI of Cisco Duo.
-
Unified Communication: “It should work as easily as a telephone call!”
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
Analyst report: SSE market overview
By: Palo Alto Networks
Type: Gartner Magic Quadrant
To advance their security postures, many businesses have leveraged a security service edge (SSE) product. Along with mapping out the key and optional capabilities of an SSE solution, this Gartner Magic Quadrant report overviews the SSE vendor landscape. To review these insights in full, read on.
-
Duo Makes Strong Security Feel Easy
By: Cisco
Type: Product Overview
At a glance, discover how Cisco Duo combines robust authentication with a user-friendly experience to make strong security feel easier than ever.
-
How SD-WAN can advance your network infrastructure
By: Core BTS
Type: White Paper
Cisco has upgraded its SD-WAN with direct cloud service access, including Office 365. Explore how SDN and SD-WAN can advance your network infrastructure in this white paper.
-
SASE put to the test: Top tools and vendors, compared
By: Palo Alto Networks
Type: eBook
To find out how three SASE products – Cisco Umbrella, Palo Alto Networks Prisma Access Enterprise and Zscaler Internet Access – stack up against each other, read this 20-page report by AV Comparatives.
-
How a next-generation firewall prevents application-layer attacks
By: TechTarget Security
Type: eGuide
The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
-
The government & security resiliency: Webcast
By: Endace
Type: Webcast
In discussion with Endace’s Michael Morris, Cisco Systems’ Senior National Security and Government Strategist provides his thoughts on cybersecurity standards and the risks in today’s landscape. The two consider how government agencies could promote bolstered security resiliency. Watch now to unlock their conversation in full.
-
Marriott Leads the Hospitality Industry in the Fight Against Online Child Exploitation
By: Cisco
Type: Video
Seeing value in Cisco Umbrella’s cloud-delivered DNS-layer security during a pilot, Marriott rapidly deployed Umbrella to nearly 5,000 properties throughout U.S. and Canada. Discover how Cisco has helped Marriott to take a stand against illegal online activity and to provide its guests with safer Wi-Fi connections.
-
Evaluating the SOAR market
By: Palo Alto Networks
Type: Analyst Report
To choose the right security orchestration, automation and response (SOAR) tool for your organization, first, you must determine the functionality and value that you need the solution to deliver. Have you already done so? Then it’s time to explore the market and its many options. Check out this Forrester report to compare 31 SOAR providers.
-
Analyzing Cisco’s Mac adoption
By: JAMF
Type: Infographic
Many believe that Macs are too expensive and too complex to support alongside other operating systems and infrastructure. Despite this belief, Cisco recently launched a Mac adoption initiative. This infographic presents the numbers of Cisco’s Mac program, a year after implementation. Read on to learn more.
-
E-Guide: Shortcut guide to Web application firewall deployment
By: TechTarget Security
Type: eGuide
Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.
-
64-page e-book: Ultimate guide to software firewalls
By: Palo Alto Networks
Type: eBook
Between expanding attack surfaces and proliferating, sophisticated threats, organizations in every industry face complex obstacles on the path to stronger cloud application security. To learn how leveraging a software firewall can help you protect your business’s cloud apps, dig into this comprehensive guide.
-
Quantifying the Value of FlexPod Converged Infrastructure
By: NetApp & Cisco
Type: White Paper
Learn how upgrading your converged infrastructure to FlexPod with Cisco M4 servers and All Flash FAS (AFF) storage can benefit your organization
-
Palo Alto Networks BPA+ Review Partner Update
By: Nexum
Type: Blog
What has your firewall done for you lately? According to Gartner, through 2023, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.I know what you’re thinking. Access this blog to learn how Palo Alto Networks has already made things easy for you with their Best Practice Assessment Plus (BPA+).
-
Compare 3 Leading SASE Solutions
By: Palo Alto Networks & Insight
Type: Analyst Report
SASE solutions aim to simplify system management by allowing IT administrators to easy manage all the necessary security measures and access permissions from a single cloud-based management architecture. Tap into this comparative report of SASE offerings by Palo Alto Networks, Cisco and Zscaler broken down by 8 sub-tests.
-
Expert E-Book: Data Security and the Cloud
By: TechTarget Security
Type: eBook
This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
-
How to secure hybrid work: Guide for success
By: Cisco
Type: eBook
As the corporate world enters a hybrid era, companies must adapt to protect their digital assets and people. PeerSpot members are putting the Cisco Secure Hybrid Work solution to work in use cases that seek to realize these protective goals.
-
Texas district boosts IT security & efficiency
By: Fortinet, Inc.
Type: Case Study
Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
-
The growth of cloud-based networking: What to expect in 2022 and beyond
By: TechTarget ComputerWeekly.com
Type: eBook
By upgrading to advanced network infrastructure, firms can deliver mission-critical services through cloud providers and through their own cloud resources. These increased capacity need has seen deployment of optical networking and advanced network solution such as software-defined wide area network (SD-WAN). Read more in our exclusive e-guide.
-
How Analysts Can Confidently Remediate Security Incidents
By: Endace
Type: Product Demo
In this video, Endace’s Michael Morris demonstrates an integration and workflow between Endace, Cisco Firepower and Splunk Enterprise. View now to understand how the workflow can enable analysts to more confidently remediate security incidents.
-
Next Generation Network Management Techniques
By: TechTarget Security
Type: Ezine
The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
-
Enhancing security and care at MHC Healthcare with Cisco
By: Cisco
Type: Case Study
With over 700 employees and 55,000 patients, MHC Healthcare needed strong security that was also easy to use. With Cisco providing seamless protection across users and devices, MHC can focus on what matters most – providing the highest level of care for those who need it most.
-
Single-vendor SASE: Cato Networks vs. 7 other vendors
By: Cato Networks
Type: Gartner Magic Quadrant
By 2025, Gartner predicts, there will be over a 50% increase in the number of vendors with single-vendor SASE offerings, compared to mid-2023. So, which vendors can you expect to lead the market? Review this Gartner Magic Quadrant report to compare 8 top single-vendor SASE providers.
-
A workflow for enhancing your threat-resolution strategy
By: Endace
Type: Product Demo
Want to accelerate the resolution of security attacks? This demo maps out how you can do so by leveraging an integration workflow from Cisco Stealthwatch to EndaceProbe. View now to learn more.
-
Securing the perimeter-less network with increased visibility
By: Fortinet, Inc.
Type: Product Overview
With the death of the network perimeter, cybercriminals have proven that every asset is a potential entry point for an attack. FortiGate Next-Generation Firewalls
-
Best practices for addressing voice network vulnerabilities
By: Ribbon Communications
Type: White Paper
As communications technology has advanced and brought on subsequent security issues, it has become clear that firewalls alone are not enough to provide a secure network. Instead, enterprises need a complete, seamless approach to network security to preempt issues and protect their organizations. Access this white paper to learn more.
-
Infographic: Zoom vs Teams vs Cisco
By: TechTarget ComputerWeekly.com
Type: eGuide
While all video conferencing tools perform broadly similar tasks, there are certain differences between products and providers.Here we examine the Cisco, Microsoft, and Zoom platforms, highlight the unique features of each product, and explain how the products differ from one another.
-
Single-vendor SASE: Compare 8 top providers
By: Palo Alto Networks
Type: Gartner Magic Quadrant
By 2026, according to Gartner, 60% of new SD-WAN purchases will be part of a single-vendor SASE offering, compared to 15% in 2023. You may have some questions: What are key capabilities in a single-vendor SASE offering? Which vendors lead the market? To unlock answers, explore this Gartner Magic Quadrant report, which compares eight top providers.
-
SD-WAN: HPE (Aruba) vs. Cisco vs. 12 other vendors
By: Aruba Networks
Type: Gartner Magic Quadrant
To compare 14 top SD-WAN vendors, including HPE (Aruba), Cisco and Palo Alto Networks, review this 2023 Gartner Magic Quadrant report.