firewall

Results 351 - 375 of 403Sort Results By: Published Date | Title | Company Name
Published By: IGLOO Software     Published Date: Dec 29, 2009
Networked business models are the wave of the future as we extend collaboration, knowledge sharing and networking beyond the corporate firewall to customers, partners and suppliers. Focusing resources on optimizing your relationships with these stakeholders can make you more resilient and adaptive to shifts in the market.
Tags : 
social marketplace, igloo, collaboration, facebook, linkedin, twitter, web 2.0, loyalty, erp, crm, google analytics
    
IGLOO Software
Published By: McAfee Inc     Published Date: Nov 16, 2009
With all the benefits and opportunities the Internet provides, it can also be a very inhospitable place, requiring organizations' constant vigilance to protect themselves from attack. To better understand important security issues affecting organizations today, IDC recently completed a survey of more than 260 IT and Firewall managers and executives in the US and Europe that aimed to profile their organization's firewall deployments.
Tags : 
mcafee, email protection, firewall, it security, midsize, global threat intelligence, security, data protection
    
McAfee Inc
Published By: Juniper Networks     Published Date: Sep 10, 2014
Concerned about attacks on web-facing applications? Download the Whitepaper to understand the limitations of next-generation firewalls and learn about three technologies that protect web applications and data centers.
Tags : 
next generation firewalls, application attacks, web-facing applications, firewall limitations, protection technology, data center
    
Juniper Networks
Published By: Dell SonicWALL     Published Date: Nov 28, 2012
According to Time, as much as 40% of social network users are exposed to some form of malware.
Tags : 
firewall, security, social media, threats, web2.0, consumerization, byod, business technology
    
Dell SonicWALL
Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering, http traffic, application awareness
    
McAfee
Published By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems
Published By: Symantec     Published Date: Jul 11, 2017
In the fast moving web environment, where hackers frequently change their tactics, a defense-in-depth strategy of deploying the ProxySG in conjunction with an NGFW is essential for providing optimal protection. The ProxySG is engineered to withstand evasion techniques, making it a perfect complement to your NGFW. Its leading web-proxy technology identifies and blocks malicious web content, and its open architecture allows integration with best-of-breed products for an enhanced security posture. These top 10 advantages represent just a few of the reasons why SWG and NGFW technologies are complementary in nature and why enterprises should implement them together for a layered defense against advanced attacks and targeted threats.
Tags : 
proxy deployment, firewall, threat detection, threat protection
    
Symantec
Published By: Cisco     Published Date: Sep 12, 2014
Every day, the threat landscape changes, and it can be hard to keep up. To help you strengthen your network security, Cisco has compiled the top 10 considerations that midsize companies should keep in mind when buying a next-generation firewall. Complete the form to download the white paper "Selecting a Next-Generation Firewall: Top 10 Considerations." You will learn about: Deep visibility into applications Requirements for proactive threat protection Services that can improve your migration plan and ongoing support management Read White Paper
Tags : 
firewall, buying, next-generation, companies, midsize, strengthen, network, security, visibility, management, support, migration, services, applications, improve, proactive, protection, data management
    
Cisco
Published By: iPass     Published Date: Feb 12, 2009
Unlike Wi-Fi access, 3G mobile broadband is available anywhere users have a mobile phone signal-from. From taxis, to trains, to remote stretches of road - your workforce will have access to critical data. If your company is even considering about deploying mobile broadband to its workforce, read this guide now!
Tags : 
wifi, wi-fi, ipass, mobile, broadband, security, workforce, wireless communications, mobility, pda, blackberry, vpn, firewall
    
iPass
Published By: Juniper Networks     Published Date: Oct 20, 2015
As with sports cars, performance is a top buying criteria for firewalls. Because if you can’t keep up with the traffic—real traffic, not traffic in the labs—your apps will be unhappy, and your users even more so.
Tags : 
juniper, firewall, traffic, networking, security
    
Juniper Networks
Published By: Zscaler     Published Date: Oct 26, 2018
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them. Download this whitepaper today to find out more.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: May 15, 2019
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them.
Tags : 
    
Zscaler
Published By: McAfee     Published Date: Feb 06, 2013
There is no single anti-malware product that can block all malware infiltration and subsequent activity. The only way to combat the malware threats is through an end-to-end, integrated, real-time, context-aware, holistically-managed system.
Tags : 
threat protection, security threat landscape, malicious sites, phases of network attack, social engineering, configuration error, persistant code, rootkits, website filtering, device control, buffer overflow, physical file transfer, desktop firewall, web filtering, email filtering, web gateway, email gateway, application control, application whitelisting, host ips
    
McAfee
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Fortinet, Inc     Published Date: Nov 14, 2013
This paper explores the capabilities behind Fortinet’s Next-Generation Firewalls. The FortiGate devices provide a consolidated security offering backed by high-performance network protection for a lower TCO than other vendors.
Tags : 
data center, asic, low latency, firewall, fortinet, palo alto networks, cisco, juniper, checkpoint, enterprise, throughput, security, network
    
Fortinet, Inc
Published By: IBM     Published Date: Aug 21, 2008
As businesses grow increasingly dependent upon Web applications, these complex entities are becoming more difficult to secure. Most companies equip their Web sites with firewalls, Secure Sockets Layer (SSL), and network and host security, but the majority of attacks are on applications themselves.
Tags : 
application security, web security, ibm, ibm mi, ibm grm, security
    
IBM
Published By: Akamai     Published Date: Jul 01, 2011
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Tags : 
akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection, waf
    
Akamai
Published By: Dell & Microsoft     Published Date: Jul 10, 2013
USF Pediatric Epidemiology Center boosts network security performance 10-fold, while saving $100,000 with SuperMassive Next-Gen Firewall
Tags : 
usf, dell sonicwall, big data, network security
    
Dell & Microsoft
Published By: Websense     Published Date: Jul 08, 2014
A white paper by Websense examining how anomalies in crash reports can be used to detect unknown threats.
Tags : 
detecting unknown threats, websense, next-generation firewall
    
Websense
Published By: CA Technologies     Published Date: Sep 25, 2017
Protecting privileged access and preventing breaches remains an urgent concern for companies of all sizes. Attackers are using a wider range of more sophisticated methods to infiltrate vulnerable systems. And although news of external breaches often dominates headlines, organizations must also be able to defend against insider threats.
Tags : 
threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
    
CA Technologies
Published By: Barracuda     Published Date: Jul 25, 2014
This research paper by Info-Tech evaluates 10 competitors in the NGFW market to help you choose the right vendor and products for your enterprise needs.
Tags : 
ngfw, next generation firewall, evaluation of security providers, security vendor comparison, security
    
Barracuda
Published By: Cisco     Published Date: Jan 28, 2009
Here are some things to consider when choosing Cisco SMB Solutions that enable you and your colleagues to work from anywhere.
Tags : 
cisco, virtual office, vpn, firewall, virtual private network, networking costs, recruitment reach, remote employees, networking, security
    
Cisco
Published By: WebEx     Published Date: Apr 02, 2009
The business of taking care of remote hardware and software has never been bigger:-Managed systems and services for retail, point of sale, hospitality, and other distributed operations are a hot growth area.- Enterprise help desks manage an increasingly dispersed array of hardware and software.- Enterprise software providers are moving to managed services and other value added support offerings to preserve margins in the face of increasing price pressure.
Tags : 
webex, virtual support networks, virtual support network, vsn technology, standard remote management, it server management, local area network, lan, firewall, virtual private network, vpn, security, support costs, isdn, wifi, slas, tco, it management
    
WebEx
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee