Firewall Security Reports

What to Look for in Web Application Firewall Products
sponsored by TechTarget Security
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

TechTarget Security

Why You Need A Next-Generation Firewall
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explains how next-generation firewalls protect security systems from advanced attacks, and how they fit in with your business strategy.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

Hewlett Packard Enterprise

Mobile: The Technology Game-Changer in 2013
sponsored by TechTarget Security
EGUIDE: TechTarget's recent IT Security Trends 2013 revealed mobility took the cake for biggest fear. In this E-Guide, uncover the results and analysis of the survey to better understand what's in store for your organization.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Increasing Security Throughput with Palo Alto Networks & Brocade
sponsored by Copper River IT
WHITE PAPER: The growing volume of information entering and leaving a data center often exceeds a single network's capacity. Read this white paper to learn how you can maintain data center speeds without sacrificing your security.
Posted: 05 Oct 2012 | Published: 04 Oct 2012

Copper River IT

Presentation Transcript: Integrating Cloud into Your Infrastructure Planning
sponsored by GoGrid
PRESENTATION TRANSCRIPT: So you've heard all the noise about saving capital by using public cloud computing services, but actually integrating with cloud services requires some careful planning. This transcript covers cloud integration and cloud security considerations, and it will set you up the right way to begin integrating with cloud computing services.
Posted: 12 Aug 2010 | Published: 12 Aug 2010

GoGrid

Achieve Deeper Network Security and Application Control
sponsored by DellEMC and Intel®
EBOOK: Combating emerging threats effectively while reducing the total cost of ownership (TCO) is crucial in a firewall. Read this paper and learn how NGFWs help you achieve a deeper level of security and safeguard your organization against today's evolving threats.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

DellEMC and Intel®

Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
sponsored by Dell SonicWALL
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Cloud Endpoint Security: Considerations for Cloud Security Services
sponsored by Symantec Corporation
EGUIDE: This E-Guide from SearchSecurity.com explains the benefits of cloud endpoint security services and unveils a number of considerations to keep in mind before adoption. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

Symantec Corporation

Take Back Control: Increase Security, Empower Employees, Protect the Business
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Read this white paper to find out how WatchGuard Application Control lets you take back control of your network by keeping more than 1,500 applications in check, including IM, P2P, Facebook, Skype, YouTube, and many more.
Posted: 20 Oct 2010 | Published: 20 Oct 2010

WatchGuard Technologies, Inc.