Firewalls White Papers

A Firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD), or packet filter in BSD contexts. A firewall has the basic task of controlling traffic between different zones of trust.
Results 1 - 25 of 216Sort Results By: Published Date | Title | Company Name
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.

Tags : mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
By: McAfee     Published Date: Feb 25, 2015

This white paper articulates the business benefits derived by companies that have deployed NGFW.

Tags : ngfw, mobile workforce, security, mcafee, new generation firewall, firewall security, firewall, anti spam
    
By: Juniper Networks     Published Date: Feb 18, 2015

Find out why an open, scalable network architecture is essential for enhanced IT security in the cloud era. This eBook explains how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.

Tags : juniper, juniper networks, security, network security, firewalls, intrusion prevention, security management, data protection
    
By: Juniper Networks     Published Date: Feb 18, 2015

Discover how a dynamic, intelligent firewall can improve your security. This Webinar talks about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall solutions.

Tags : firewall, network, business assets, security, management, network security, firewalls, security management
    
By: Juniper Networks     Published Date: Feb 18, 2015

Learn about the challenges as you deploy hybrid clouds. The Forrester Report analyzes the views and approaches of IT decision-makers who have already begun their journey to the hybrid cloud.

Tags : hybrid clouds, network, data center, automation, network virtualization, firewalls, database security, virtualization
    
By: Juniper Networks     Published Date: Feb 18, 2015

Learn how to improve your business agility in this Whitepaper on building a business case for network virtualization. Find out how your network can deliver new levels of performance and resiliency.

Tags : business agility, network architecture, virtualization, network, cloud computing, data center, data management, firewalls
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Download our Guide to the Threat Landscape to have access to a wealth of IT security intelligence.

Tags : security intelligence, malware, spam, spyware, firewall, internet security, anti spam, anti spyware
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: McAfee     Published Date: Feb 25, 2015

This White Paper reveals a wide range of opinions of different experts about network performance and security trade-off.

Tags : network performance, security trade-off, security, firewalls, mcafee, internet security, network performance management, network security
    
By: CA Technologies     Published Date: Jan 09, 2015

This white paper focuses on new ways to help and protect the Business and shows new trends which have changed the demands on IT organizations and the business. The world of IT has changed dramatically over the past 1-2 years, as cloud and mobility have changed the demands on IT organizations and the business. As a result, IT must evolve how it interacts with the business to help the business grow and succeed.

Tags : identity-based security, business protection, identity, security solutions, new trends to secure business, access control, application security, authentication
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, firewalls, hacker detection
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, encryption, firewalls
    
By: Symantec     Published Date: Nov 24, 2014

This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.

Tags : cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware, anti virus, application security, email security
    
By: Symantec     Published Date: Nov 24, 2014

This solution brief is aimed at helping you to implement the right security strategy now.

Tags : implementing a security strategy, preparing for malware attacks, understanding attacks, anti spam, anti spyware, anti virus, email security, encryption
    
By: Symantec     Published Date: Nov 19, 2014

This year’s ISTR once again covers the wide-ranging threat landscape, with data collected and analyzed by Symantec’s security experts.

Tags : internet security, istr, cybercrime, internet security trends, anti spam, anti spyware, anti virus, application security
    
By: Symantec     Published Date: Nov 19, 2014

This info-graphic provides important statistics and information on web-based targeted attacks and how you can help protect yourself.

Tags : web based targeted attacks, internet security, protections from web attacks, anti spam, anti spyware, anti virus, firewalls, intrusion detection
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.

Tags : protecting against targeted attacks, advanced persistent threats, business security, the evolving threat landscape, anti spam, anti spyware, anti virus, business continuity
    
By: Symantec     Published Date: Nov 19, 2014

The top ten tips on how to secure your business against cyber risk and threats.

Tags : tips for cyber resilience, anti spam, anti spyware, anti virus, firewalls, hacker detection, internet security, intrusion detection
    
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End