Hardware  >   Security Hardware  >   Network Security Hardware  >   Network Security Appliances  >  

Network Firewall Appliances

RSS Feed   
Network Firewall Appliances Reports
 
Not All Next-Generation Firewalls Are Created Equal
sponsored by Barracuda Networks
WHITE PAPER: This paper digs into how to build your own secure application delivery network using a firewall that can appropriately optimize traffic between locations for latency and throughput. Read on to see this framework and to learn how your organization can benefit from it.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Combating Today’s Security Threats
sponsored by SearchSecurity.com
EGUIDE: In this expert guide, gain a better understanding of advanced persistent threats (APTs) and how you can stay one step ahead. View now to gain key insight into security strategies that can help you protect your organization.
Posted: 20 Feb 2012 | Published: 17 Feb 2012

SearchSecurity.com

Advanced Secure Access for Remote and Mobile Workers
sponsored by Barracuda Networks
PRODUCT OVERVIEW: Download this resource to discover how to provide your mobile workers with secure, flexible, remote access to corporate apps and information, and reduce the risks of BYOD, with a cloud-based firewall.
Posted: 21 May 2019 | Published: 31 Dec 2018

Barracuda Networks

Achieve Deeper Network Security and Application Control
sponsored by DellEMC and Intel®
EBOOK: Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

DellEMC and Intel®

Getting the Most out of your NextGen Firewall
sponsored by Cisco Systems, Inc.
WHITE PAPER: This exclusive resource takes an in-depth look at next generation firewalls (NGFWs), discussing their benefits, challenges, and how you can get the most value from them.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

Cisco Systems, Inc.

Presentation Transcript: Integrating Virtual-Aware Security Technologies
sponsored by Intel
PRESENTATION TRANSCRIPT: There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

Intel

Voice over IP (VoIP) Growth and the Strain on Network Security
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Explore how VoIP can expose your organization to numerous risks and uncover why traditional firewalls often cannot thwart the many challenges VoIP presents.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

WatchGuard Technologies, Inc.

How Application Intelligence and Control enables network security in the wake of Web 2.0, Cloud Computing and Mobility
sponsored by SonicWALL
EBOOK: This paper explores how innovations such as mobility, Web 2.0, social media and cloud computing have dramatically changed the IT landscape and introduced new security threats into corporate and government networks.
Posted: 25 Feb 2011 | Published: 25 Feb 2011

SonicWALL

How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
WEBCAST: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this webcast, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus.
Posted: 19 Nov 2009 | Premiered: Nov 19, 2009

Faronics

Beyond the Next Generation: Meeting the Converging Demands of Network Security
sponsored by IBM
WHITE PAPER: Read this whitepaper to learn more about rising to the converging demands of network security. Topics covered include the evolution of network security, the development of "next-generation" approaches, use cases and more.
Posted: 04 Sep 2013 | Published: 30 Sep 2012

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info