Network Firewall Appliances Reports

Next-Generation Firewall
sponsored by SonicWALL
WHITE PAPER: It can be a real challenge for IT administrators to efficiently deliver critical corporate solutions while also contending with employee use of wasteful and often dangerous applications. Critical applications need bandwidth prioritization while social media and gaming applications need to be bandwidth throttled or even completely blocked.
Posted: 28 Feb 2011 | Published: 28 Feb 2011

SonicWALL

Selecting a Next-Generation Firewall: Top 10 Considerations
sponsored by Cisco
WHITE PAPER: In this white paper, learn about the 10 features your next-generation firewall should have to protect your network from a range of threats.
Posted: 01 Apr 2014 | Published: 28 Feb 2014

Cisco

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex

High Performance Wi-Fi Demystified
sponsored by Xirrus - don't use
PRODUCT LITERATURE: The Xirrus Wi-Fi Array represents the next generation in wireless LAN (WLAN) architectures.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

Xirrus - don't use

Web Application Firewalls Are Worth the Investment for Enterprises
sponsored by Imperva
ANALYST REPORT: This resource explains how Web application firewalls help security leaders to better protect Web applications in their organizations.
Posted: 29 Apr 2014 | Published: 28 Feb 2014

Imperva

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

New AWS Migration Tools Target Big Data Behind a Firewall
sponsored by New Relic
EGUIDE: Amazon Web Services (AWS) recently added a multitude of capabilities to its public cloud that greatly reduce the data migration problem and decrease the fear of data breaches. This expert e-guide highlights all the new features of AWS that could soon be positively impacting your business.
Posted: 23 Jun 2016 | Published: 21 Jun 2016

New Relic

To Block or Not. Is that the Question?
sponsored by Palo Alto Networks
WHITE PAPER: This White Paper is a practical guide to how to properly deal with Enterprise 2.0 applications (and what they are to begin with), from getting visibility to how to create and enforce policies that allow for safe enablement.
Posted: 05 Jan 2010 | Published: 01 Dec 2009

Palo Alto Networks

Essential Guide to Threat Management
sponsored by Information Security Magazine
EBOOK: Check out this expert eBook and get expert advice that can help your company successfully improve its threat management posture.
Posted: 19 Mar 2009 | Published: 19 Mar 2009

Information Security Magazine

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
PRESENTATION TRANSCRIPT: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.
Posted: 07 Jan 2010 | Published: 07 Jan 2010

Faronics