Firewalls White Papers

A Firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD), or packet filter in BSD contexts. A firewall has the basic task of controlling traffic between different zones of trust.
Results 1 - 25 of 186Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Aug 15, 2014

À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?

Tags : cybersecurity, hackers, data protection, secure networks, antivirus, virus, firewall, anti spam
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: F5 Networks Inc     Published Date: Jan 03, 2014

Turning on firewall features can sometimes result in a significant performance hit, creating an obstacle for network architects. In this Network World Clear Choice test, learn about a firewall solution that can help your business overcome these performance challenges by maxing our network capacity while also offering filtering and attack protection capabilities.

Tags : network world, data center, firewall, load balancer, scalability, data center management, dos protection, security
    
By: McAfee     Published Date: Aug 14, 2014

The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.

Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website.

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website.

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 30, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: Symantec     Published Date: Jul 29, 2014

Knowledge is power: the Symantec guide to protecting your website

Tags : protecting your website, vulnerability scans, website vulnerability, malware, spyware, symantec, norton, anti spam
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.

Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods

Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

A white paper on the demands you should make from your next-generation firewall.

Tags : ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, anti spam, anti spyware, anti virus
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

A white paper on the demands you should make from your next-generation firewall.

Tags : ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware
    
By: McAfee, Inc.     Published Date: Jun 03, 2014

A white paper on the demands you should make from your next-generation firewall.

Tags : ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware
    
By: McAfee, Inc.     Published Date: May 07, 2014

A Gartner report showing its key findings, recommendations and analysis of endpoint protection platforms.

Tags : endpoint protection platforms, gartner, mcafee, epp analysis, anti spam, anti spyware, anti virus, application security
    
By: Black Lotus     Published Date: Apr 21, 2014

Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.

Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
By: Rapid7     Published Date: Mar 19, 2014

This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.

Tags : rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
By: IBM     Published Date: Feb 27, 2014

Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.

Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spyware
    
By: McAfee, Inc.     Published Date: Feb 17, 2014

Discover the requirements of a Next Generation Firewall (NGFW) and what capabilities are required in order to protect against the ever evolving threat.

Tags : cyber security, advanced evasion, aets, security, network security, firewall, cyber attack, anti spam
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End