firewall

Results 376 - 400 of 403Sort Results By: Published Date | Title | Company Name
Published By: Sun Microsystems     Published Date: Jul 20, 2009
This free white paper from the experts at IDC reveals the profound impact of social technologies-also known as Web 2.0-on enterprise IT. Users are demanding capabilities including collaboratively working across regions, knowledge capture, and community and brand building outside the firewall. But you can meet those demands-if you're ready.
Tags : 
web 2.0, sun, social technologies, enterprise it, collaboration, virtualization, sun microsystems, power, cooling
    
Sun Microsystems
Published By: WebEx     Published Date: Apr 02, 2009
IDG Research Services recently queried 144 CIO Magazine subscribers to gain insight into how and why collaboration technology is creating competitive advantage. This summary report explores different market trends with commentary from key respondents as well as WebEx's Knight, an industry expert. Learn more today!
Tags : 
webex, collaborative efforts, on-demand, collaboration technology, competitive advantage, webex knight, firewall, external audiences, collaboration applications, online training, online meetings, portals, instant messaging, online webinars/events, human resources technology, enabling knowledge workers, erp, crm, external audiences, vendor solutions
    
WebEx
Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan, firewall, virtual private network, vpn, security, support costs, isdn, wifi, slas, tco, it management
    
WebEx
Published By: WebEx     Published Date: Apr 02, 2009
This white paper presents a simple two-step process to kicking the NetMeeting habit: 1. Admitting there is a problem by recognizing the symptoms. 2. Creating a recovery plan by finding new applications and implementing a new solution.
Tags : 
webex, web conferencing, netmeeting, firewalls, apis, asp, live meeting, itu-t t.120 data conferencing, mcu, network address translation devices, nats, public switched telephony network, pstn, crm, roi, it support costs, web communications, full-time employee, fte, enterprise print management solutions
    
WebEx
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Published By: Cisco     Published Date: Feb 12, 2009
Spam email continues to be a big problem, especially for small businesses. Small companies rely on email just as much as large enterprises, and their mail servers get clogged with unsolicited mail just as often. But, with fewer resources to spare to address the spam problem, small businesses need smarter solutions. To find out how you can use the Cisco Spam & Virus Blocker to eliminate spam, improve productivity, and boost security and network performance in your business download today!
Tags : 
cisco, spam, anti-virus, servers, firewall, security
    
Cisco
Published By: iPass     Published Date: Feb 12, 2009
Unlike Wi-Fi access, 3G mobile broadband is available anywhere users have a mobile phone signal-from. From taxis, to trains, to remote stretches of road - your workforce will have access to critical data. If your company is even considering about deploying mobile broadband to its workforce, read this guide now!
Tags : 
wifi, wi-fi, ipass, mobile, broadband, security, workforce, wireless communications, mobility, pda, blackberry, vpn, firewall
    
iPass
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy, encryption policy, remote access policy, firewall, vpn, intrusion prevention, content security, networking, security
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : 
cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl, ip security, ipsec, firewall, vpn, unauthorized access, spam and phishing, real-time protection, threat-protected vpn, safe remote access, antivirus, anti-spyware, anti-spam, anti-phishing
    
Cisco
Published By: Cisco     Published Date: Jan 28, 2009
Here are some things to consider when choosing Cisco SMB Solutions that enable you and your colleagues to work from anywhere.
Tags : 
cisco, virtual office, vpn, firewall, virtual private network, networking costs, recruitment reach, remote employees, networking, security
    
Cisco
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : 
web application assessment, defense technologies, whitehat security, web application vulnerabilities, security, enterprise applications
    
F5 Networks Inc
Published By: IBM     Published Date: Jan 12, 2009
In today's competitive environment, sharing information and expertise can be critical in driving organizational success. To foster innovation, it's important to create collaboration communities of employees, as well as customers and partners "outside the firewall." Read this white paper to learn how to tap into both internal and external knowledge.
Tags : 
ibm, collaboration communities, tapping internal knowledge, innovation at workplace, collective knowledge, collaboration through communication, networking, knowledge management, enterprise applications
    
IBM
Published By: HP - Enterprise     Published Date: Oct 16, 2008
If your company stores or processes credit card information, you must be able to demonstrate compliance with the Payment Card Industry (PCI) Data Security Standards (DSS). These standards include requirements for security management, policies, procedures, network architecture, design, and other critical protective measures. They also include one very prescriptive requirement:  Section 6.6 mandates that organizations secure all Web applications by conducting a code review or installing an application layer firewall. Companies have had a very difficult time passing the other parts of Section 6 and they have experienced a rising number of data breaches. Unless companies take 6.6 seriously, PCI compliance failure rates, and data breaches, will continue to grow.  Read this whitepaper to gain an overview of best practices to pass Section 6.6 and an understanding of the technology available to you.
Tags : 
business risk, security, application security, audit, risk, vulnerabilities, fortify, fortify software, hackers, cyber threats, application security standards, threats, assessment, remediation, pci, compliance, payment card industry, data security standards, data management
    
HP - Enterprise
Published By: IBM     Published Date: Aug 21, 2008
As businesses grow increasingly dependent upon Web applications, these complex entities are becoming more difficult to secure. Most companies equip their Web sites with firewalls, Secure Sockets Layer (SSL), and network and host security, but the majority of attacks are on applications themselves.
Tags : 
application security, web security, ibm, ibm mi, ibm grm, security
    
IBM
Published By: KEMP Technologies     Published Date: Aug 04, 2008
Small-to-medium sized businesses (SMB) are increasingly relying upon web-based applications and web-enabled services for running their business. Applications such as CRM, e-commerce transactions and other web-enabled applications are accessed both locally and remotely from outside the business facilities. These web-based applications are vulnerable to attacks from viruses, intrusions, and denial of service (DoS) attacks, as traffic comes into the network through various ports and firewalls without being inspected.
Tags : 
load balancer, load balancing, application delivery, ssl acceleration, application optimization, windows terminal services, terminal services, content switching, server load balancing, application security, network security, kemp, kemp technologies
    
KEMP Technologies
Published By: Process Software     Published Date: May 14, 2008
Spyware is on the rise and has been the cause of many data breaches. Stopping it needs to be a strategic part of an organization's overall security plan. Reactive signature-based anti-virus and firewall technology is not a complete solution to prevention. Read this white paper to learn the top five behaviors associated with data theft and how advanced behavioral detection solutions is an effective technology for stopping spyware and can identify and prevent legitimate applications from being misused.
Tags : 
spyware, trojan, virus, malware, web security, internet security, process software, process, antispyware, hosts, spyware, threats, virus protection, security
    
Process Software
Published By: Secure Computing     Published Date: Feb 06, 2008
The Payment Card Industry Data Security Standard requires merchants and transaction processors to protect customer data, and firewalls play a major role in the process.  This paper was written by Matt Sarrello, CISSP, contributing editor at Ziff Davis Enterprise and Michael Steinhart, senior editor at Ziff Davis Enterprise.
Tags : 
cardholder data, data security, database security, data protection, pci, pci dss, pci-dss, compliance, credit card, payment card, secure computing, securecomputing, tjx, security
    
Secure Computing
Published By: ESET     Published Date: Feb 01, 2008
It is important for businesses to have a plan in place that addresses the changing threat landscape.  This podcast discusses various items for businesses to consider when developing an IT threat model.
Tags : 
threat planning, testing, penetration testing, defense in depth, multilayered, firewall, filtering, white listing, it strategy, eset, nod32, antivirus, malware, internet threats, web based threats, web 2.0, smb, small business, medium business, eset
    
ESET
Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware, virus, anti virus, sunbelt, sunbelt software, architecture, phishing, policy based, policy-based, malware, trojan, trojans, mail server
    
Sunbelt Software
Published By: Perimeter     Published Date: Jul 17, 2007
Read this interesting comparison about designing an intrusion defense strategy that identifies the value of business processes, and implements appropriate strategies to protect these systems using a layered defense approach is not only a good security practice, but also a regulation in many cases.
Tags : 
ids, intrusion defense, intrusion prevention, firewall, security, compliance, layered security, ips, perimeter, perimeter esecurity, security software, malware, trojan
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
What is the difference between a risk, a threat, a vulnerability and an exploit? Which product or solution can be employed to address my institution’s information security and compliance needs? This paper provides some clarity on the first question, and in the process, it should help to offer an answer to the second question, one of aligning concerns with solutions with vulnerability management.
Tags : 
risk management, vulnerability assessment, ips, intrusion prevention, ids, intrusion detection, firewall, exploit, infrastructure, patch management, email defense, email security, perimeter, perimeter esecurity, security
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
With the decrease in the total number of viruses, some have theorized that the need for virus protection is becoming less and less necessary. The purpose of this paper is to help individuals understand the scope of the problem, and specific strategies available to combat this continually changing threat.
Tags : 
patch, ips, intrusion prevention, ids, intrusion defense, security policies, spam, spyware, malware, firewall, firewalls, virus, anti-virus, anti virus, perimeter, security software, perimeter esecurity
    
Perimeter
Published By: Perimeter     Published Date: Jul 17, 2007
Before Microsoft released Microsoft XP Service Pack 2 (SP2), most attackers would compromise a computer system by simply attacking it with known vulnerabilities or "bugs" that could allow the attacker to gain some level of control over the system. Newer attack methods were starting to be seen where the attacker would take advantage of vulnerabilities within the Internet browser itself.
Tags : 
virus, anti-virus, anti virus, spyware, windows xp, xp sp2, intrusion detection, ids, intrusion prevention, ips, spam, filtering, blocking, malware, malicious code, windows firewall, perimeter, perimeter esecurity
    
Perimeter
Published By: Jumpnode Systems     Published Date: Jun 12, 2007
Network monitoring software packages require complex installation, ongoing maintenance and additional costs for servers and third-party applications. Software-as-a-Service (SaaS) network monitoring alternatives greatly simplify implementation and maintenance, but they rely on uninterrupted Internet access to function, often require complex VPNs or firewall modifications, and typically provide limited access to historical data.
Tags : 
monitoring, software as a service, saas, high availability, network management, jumpnode
    
Jumpnode Systems
Published By: Ingate Systems     Published Date: May 31, 2007
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
Tags : 
communication, communications, voip, voice over ip, lan, local area network, ip networks, ip telephony, internet security, firewall, firewalls, ingate, ingate systems
    
Ingate Systems
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee