Firewalls White Papers

A Firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD), or packet filter in BSD contexts. A firewall has the basic task of controlling traffic between different zones of trust.
Results 1 - 25 of 168Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

Tags : cybersecurity, hackers, data protection, secure networks, antivirus, virus, firewall, anti spam
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: Norse     Published Date: Oct 22, 2013

As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.

Tags : threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks
    
By: General Dynamics Fidelis Cybersecurity     Published Date: May 20, 2014

Join Gigaom Research and our sponsor General Dynamics Fidelis Cybersecurity Solutions for “The Modern Perimeter and More: Countering Advanced Security Threats,” a free analyst on-demand webinar.

Tags : fidelis, internet security, web security, cyber attacks, security threats, hackers, modern security threats, cyber criminals
    
By: Black Lotus     Published Date: Apr 21, 2014

Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.

Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
By: Rapid7     Published Date: Mar 19, 2014

This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.

Tags : rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
By: IBM     Published Date: Feb 27, 2014

Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.

Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
By: Arbor Networks     Published Date: Feb 12, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors.

Tags : arbor, arbor networks, security management, firewalls, threats, hackers, internet security, network security
    
By: McAfee     Published Date: Jan 28, 2014

NSS Labs provides overall exploit protection rates for 11 popular enterprise Endpoint Protection Products.

Tags : epp, endpoint, protection, threats, malware, nss, anti spam, anti spyware
    
By: McAfee     Published Date: Jan 28, 2014

Modern malware defenses use layers of blacklisting and whitelisting, enhanced with real-time analysis and reputation data, to protect the endpoint computing stack.

Tags : blacklisting, whitelisting, malware, endpoint, mcafee global threat intelligence, epolicy orchestrator, byod, anti spam
    
By: McAfee     Published Date: Jan 28, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : gartner, endpoint protection, anti spam, anti spyware, anti virus, encryption, firewalls, security management
    
By: Cisco Systems     Published Date: Dec 23, 2013

Does your WAN provide sufficient performance and reliability for your remote-site users? In this guide, discover how to design a full-service network with secure, encrypted communications using Cisco Dynamic Multipoint VPN technology. Download Design Guide

Tags : vpn, wan, cisco, cisco validated designs, cvds, remote-site user performance, full-service network, encrypted communications
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: Palo Alto Networks     Published Date: Dec 11, 2013

The 10 Things Your Next Firewall Must Do outlines the latest capabilities that a firewall should possess and helps you learn how to choose a firewall that can safely enable your business in the ever-changing world of network security. In this free booklet, you'll find an insight and practical advice on: - Considerations for choosing your next firewall - Best practices for implementing safe application enablement policies - Essential firewall capabilities for battling modern threats

Tags : firewall, palo alto, security, network security, safe applications, cyber threats, application security, firewalls
    
By: Palo Alto Networks     Published Date: Dec 11, 2013

Legacy firewalls aren't designed to address today's complex network traffic consisting of applications, users, and threats. They rely on outdated technology. Read how a new modern security platform safely enables any technology and application. - Learn why yesterday's methods can't handle today's cyberthreats - Find out if your firewall has the ability to see and control traffic, and prevent APTs - Discover how you can deliver modern security without compromising performance - Read why bolt-on security is a costly approach to security

Tags : cybersecurity, firewalls, palo alto, technology, application, network traffic security, prevent atps, application security
    
By: Palo Alto Networks     Published Date: Dec 11, 2013

Make an informed decision on the right firewall for your business with The Firewall Buyers Guide. This guide gives you: - The fundamentals of modern firewall technology - The ten critical business requirements your next firewall needs to address - Information on how to create a vendor request for proposal (RFP) - A functional test plan to assist in your firewall selection process

Tags : firewall, palo alto, security, network security, safe applications, cyber threats, application security, firewalls
    
By: Palo Alto Networks     Published Date: Dec 11, 2013

Oferecido por um Tempo Limitado. Obtenha Sua Cópia Hoje. Tome uma decisão informada sobre o firewall correto para sua empresa com O Guia do Comprador para Firewall. Esse guia oferece: - Os fundamentos da tecnologia de firewall moderno - Os dez requisitos críticos de negócios que seu próximo firewall precisa atender - Informações sobre como criar uma solicitação para proposta (SPP) de vendedor - Um plano de teste funcional para auxiliar no processo de seleção de firewall

Tags : firewalls, tecnologia, palo alto, application security
    
By: Palo Alto Networks     Published Date: Dec 11, 2013

Ofrecida durante un tiempo limitado. Consiga su copia hoy.Tome la decisión correcta sobre qué firewall es necesario para su negocio con La Guía para compradores de firewalls. Esta guía le da: - Los fundamentos de la tecnología moderna del firewall - Los 10 requisitos de negocios críticos que su nuevo firewall debería tener en cuenta - Información sobre cómo crear un (RFP) - Un plan de pruebas funcional para ayudar en su proceso de selección de firewall

Tags : firewall, palo alto, tecnologia, application security, firewalls
    
By: Savvis     Published Date: Dec 04, 2013

The data security and IT integrity of enterprises just like yours is under unprecedented attack. A startling increase in the sophistication and number of cyber attacks is forcing virtually every company to raise their level of security consciousness. Buying IT security as a managed service can provide your organization the hardware, software, infrastructure, and the expertise that you need to protect your business in today’s complex and evolving threat environment. Read this whitepaper to learn how to maintain and grow your business in today’s ever-changing threat environment and at a commodity price. Help protect your organization and customers with a dynamic and proactive defense plan.

Tags : anti spam, anti virus, application security, firewalls, hacker detection, internet security, data loss prevention
    
By: McAfee     Published Date: Nov 11, 2013

Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.

Tags : mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, firewalls
    
By: McAfee     Published Date: Oct 10, 2013

Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.

Tags : mcafee, next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, network performance
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn how Banca Intesa prepared themselves for future cyber attacks by teaming with HP and using their ArcSight security information and event management (SIEM) solution

Tags : banca intesa, threats, hp arcsight, cyber attacks, arcsight, security information, event mangement solutions, global cyber crime
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn about the three biggest threats to mobile applications and the recommendations on how to mitigate the risk from mobile computing security vulnerabilities

Tags : mobile application threats, mobile application, mobile, risk, api, anti virus, application security, encryption
    
By: HP - Enterprise     Published Date: Sep 27, 2013

Learn why you need to embrace next-generation firewalls to stay ahead of the newest threats to IT with this whitepaper from HP

Tags : next generation firewall, firewall, next-gen, whitepaper, cloud computing, virtualization, mobility, application security
    
Start   Previous   1 2 3 4 5 6 7    Next    End