Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Firewall Appliances

RSS Feed   
ALSO CALLED: Solid State Firewall Appliances, Firewalls, Fire Wall, Network Firewall Appliances
DEFINITION: Devices that provide firewall protection for a network.
Firewall Appliances Reports
1 - 25 of 77 Matches Previous Page  |  Next Page
F5 Advanced WAF: Your Defense Against Modern Threats
sponsored by F5 Networks
WHITE PAPER: In this resource, learn about an advanced WAF technology that has the capabilities necessary to combat the evolving threats seen in the application security landscape today.
Posted: 06 May 2019 | Published: 06 May 2019

F5 Networks

Secure Branch Office Connectivity and Optimized Access to SaaS Applications
sponsored by Barracuda
WHITE PAPER: This white paper explains how to ensure uninterrupted network availability and robust access to cloud-hosted apps using a cloud-based firewall that leverages SD-WAN to scale easily across any number of locations, platforms, and apps.
Posted: 23 Apr 2019 | Published: 31 Dec 2018

Barracuda

TeamViewer Tensor Conditional Access
sponsored by TeamViewer
RESOURCE: Download this infographic to learn how a rule-based engine like a firewall can help you prevent unauthorized remote access and protect your corporate network.
Posted: 19 Apr 2019 | Published: 19 Apr 2019

TeamViewer

Next Generation Firewall Test Report
sponsored by Versa Networks
RESEARCH CONTENT: This NSS Labs report details their test of one particular network security technology – the Versa Netwokrs FlexVNF 16.1R1-S6. Find out how FlexVNF performed when blocking simulated attacks, resisting evasion techniques, handling SSL traffic, and more.
Posted: 12 Sep 2018 | Published: 17 Jul 2018

Versa Networks

Preventing Sophisticated Attacks on the Network
sponsored by Forcepoint
WHITE PAPER: This white paper explores how to defend against advanced evasion techniques (AET) and other persistent threats with a next-gen firewall (NGFW) that applies sophisticated analytics to threat detection. Find out how a NGFW, using full stack, multilayer traffic normalization, can help you defend against millions of AET variants.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Forcepoint

Endpoint Security IT Decision Center Handbook 2
sponsored by SearchSecurity.com
EGUIDE: Access this expert handbook to discover which features any endpoint protection software should have, and 10 questions to ask your vendor before choosing your next IT security investment.
Posted: 25 Nov 2013 | Published: 25 Nov 2013

SearchSecurity.com

Firewall Buyer's Guide
sponsored by Palo Alto Networks
WHITE PAPER: Your network is more complex than ever before and because of this complexity along with your security infrastructure, your ability to respond to cybersecurity challenges may be hindered. Read this Firewall Buyer's Guide to uncover 10 considerations to keep in mind when choosing a firewall to advance your security posture and incident response.
Posted: 28 Nov 2017 | Published: 28 Nov 2017

Palo Alto Networks

Cisco ASA 5500 Series Adaptive Security Appliances
sponsored by Cisco Systems, Inc.
DATA SHEET: Cisco ASA 5500 Series Adaptive Security Appliances are purpose-built solutions that integrate world-class firewall, unified communications security, VPN, intrusion prevention (IPS), and content security services in a unified platform. Download this paper for further technical details.
Posted: 28 Aug 2017 | Published: 09 Jun 2009

Cisco Systems, Inc.

How the Basics of Network Security Have Evolved
sponsored by Fortinet, Inc.
EGUIDE: In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
Posted: 09 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

IT Needs to Change its Mindset Around Mobile Data Access
sponsored by Hewlett Packard - Intel Xeon
EGUIDE: To successfully support enterprise mobility, IT admins need to change the way they think about mobile data access, security, and more. This e-guide details four things to keep in mind as your enterprise embraces this mobile world.
Posted: 17 Aug 2016 | Published: 16 Aug 2016

Hewlett Packard - Intel Xeon

New AWS Migration Tools Target Big Data Behind a Firewall
sponsored by New Relic
EGUIDE: Amazon Web Services (AWS) recently added a multitude of capabilities to its public cloud that greatly reduce the data migration problem and decrease the fear of data breaches. This expert e-guide highlights all the new features of AWS that could soon be positively impacting your business.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

New Relic

What to Look for in Endpoint Antimalware Tools
sponsored by SearchSecurity.com
EBOOK: Read this buyer's guide to uncover which types of endpoint and anti-malware tools best suit your enterprise by discovering what to look for in the strategies.
Posted: 08 Mar 2016 | Published: 07 Mar 2016

SearchSecurity.com

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

Getting the Most out of your NextGen Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
CASE STUDY: In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

BitGlass

Protecting Mission-Critical Manufacturing Data with an ERP Firewall
sponsored by OpenText GXS
WHITE PAPER: Find how an ERP Firewall can capture business process and data quality errors, so outsourcing data doesn't create mayhem within your company.
Posted: 02 Jun 2014 | Published: 31 Jul 2013

OpenText GXS

Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT: This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014

Imperva

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, learn about the 10 features your next-generation firewall should have to protect your network from a range of threats.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

Achieve Deeper Network Security and Application Control
sponsored by DellEMC and Intel®
EBOOK: Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

DellEMC and Intel®

Why You Need A Next-Generation Firewall
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 26 Feb 2014 | Published: 31 Dec 2013

Hewlett-Packard Enterprise

Cutting the Cost of Application Security
sponsored by Imperva
WHITE PAPER: This white paper presents a cost breakdown of a Web application firewall solution versus the potential costs of remediation after a successful Web attack. Click now to see why this solution is worth the investment.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Imperva

Endpoint Security: Anti-Virus Alone is Not Enough
sponsored by Lumension
ANALYST REPORT: Access this analyst report that provides researched proof as to why organizations need more than anti-virus and firewall protection to defend endpoints and networks from malicious threats.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Lumension

Top Five DNS Security Attack Risks and How to Avoid Them
sponsored by Infoblox
WHITE PAPER: Read this white paper to learn best practices and options for a hardened DNS layer that can minimize the risk of experiencing a DNS attack by identifying the symptoms and implementing a response faster.
Posted: 13 Sep 2013 | Published: 31 May 2013

Infoblox

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM

Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business
1 - 25 of 77 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement