firewall solution

Results 1 - 25 of 59Sort Results By: Published Date | Title | Company Name
Published By: Akamai     Published Date: Jul 01, 2011
This white paper examines current trends in Web application security, assessing the present threat environment as well as limitations in existing approaches to protection, and then explores how a Web application firewall solution can overcome these challenges.
Tags : 
akamai, web application security, security extension, firewall solution, cyber crime, xss, ddos, sql injection
    
Akamai
Published By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale—you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : 
akamai, web, dns, infrastructure security, sql, cloud security solution
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: May 07, 2018
Learn about Akamai Cloud Security Solutions Akamai’s web application firewall and DDoS solutions include easy-to-deploy, low-maintenance solutions for enterprises.
Tags : 
identity, theft, revenue, technical, support, data, confidential
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : 
rdns, dns, anti-virus, security, network defense
    
Akamai Technologies
Published By: Alert Logic and Rackspace     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, rackspace, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Rackspace
Published By: Alert Logic and Sungard Availability Services     Published Date: Jun 20, 2014
With large data breaches affecting retailers in 2013 and the PCI DSS 3.0 January 1, 2015 deadline approaching, the Payment Card Industry Data Security Standard (PCI DSS) is an important topic for many organizations in 2014. PCI DSS requirements can be challenging to meet from a time, resources and cost perspective. Requirements 6, 10 and 11 can be some of the most costly and resource intensive, requiring log management, vulnerability assessment, intrusion detection and a web application firewall. Alert Logic delivers solutions to meet these and other PCI DSS requirements. As the security industry’s only provider of on-demand log management, threat management, web application security, and IT compliance automation solutions, Alert Logic provides organizations with the easiest and most affordable way to secure their networks and comply with policies and regulations.
Tags : 
alert logic, sungard, pci, dss, data breaches, log management, it compliance, automation solutions
    
Alert Logic and Sungard Availability Services
Published By: Arbor Networks     Published Date: Jan 31, 2013
This white paper examines why IPS devices and firewalls fail to stop DDoS threats. It also describes how an intelligent DDoS mitigation system (IDMS) offers an ideal solution by enabling a layered defense strategy to combat DDoS attacks.
Tags : 
firewalls, intrusions, ips, fall short on ddos protection, ips devices, ddos attacks
    
Arbor Networks
Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls
    
Astaro
Published By: bigtincan     Published Date: Oct 10, 2014
These days, business productivity depends largely on the ability to securely access and interact with a wide range of information over mobile devices, such as tablets and smartphones. From sales executives to field technicians, the demand for accessing corporate content securely on mobile devices is growing exponentially. In the past, implementing security measures to protect corporate content has involved VPNs, intranets, firewalls and passwords. However the increasing uptake of mobile devices in corporate settings means security measures must be implemented over a plethora of networks and devices. bigtincan has created a powerful solution with BigTinCan hub. An application for mobile devices, it allows for the distribution, management and governance of a range of content, including documents and rich media content, with enterprise-grade security.
Tags : 
mobile apps, mobile content, mobile security, corporate content, emerging marketing, marketing research
    
bigtincan
Published By: Blue Coat Systems     Published Date: Oct 25, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
Blue Coat Systems
Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
View this paper to discover the top 5 malware delivery networks and explore how Blue Coat web security solutions powered by can protect networks.
Tags : 
malware, delivery, protect, security, security solutions, networks, delivery networks, firewalls
    
Blue Coat Systems UK
Published By: Centrify Corporation     Published Date: Apr 13, 2018
As business models have become increasingly digital, high-profile, reputation-damaging security breaches are grabbing more news media headlines. Leading companies have ramped up their investments in cybersecurity, yet that spending is often not well aligned with actual threats. Studies have shown that server-focused solutions such as network anti-virus, malware detection and website firewalls attract the biggest investments, ignoring the fact that misuse of privileged credentials is by far the most common cause of breaches. The reasons for this disconnect are not well understood, in part because it sits at the intersection of the people and technology domains. This survey, conducted by WSJ Custom Studios with sponsorship from Centrify, seeks insights into senior-level thinking on this issue, including current cybersecurity priorities and the perceived degree of alignment between threats and solutions.
Tags : 
    
Centrify Corporation
Published By: Cisco     Published Date: Jan 28, 2009
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall, VPN, and optional content security capabilities, so you can feel confident your business is protected. This easy-to-use solution lets you control access to network resources to protect business data and maximize network uptime.
Tags : 
cisco, cisco asa 5500, all-in-one security, secure sockets layer, ssl, ip security, ipsec, firewall
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at nextgeneration security solutions. It also offers: • An analysis of the capabilities you should look for (and demand) in your network security solutions • Arms you with the information you need to be an educated buyer • Helps you get what you need, and not a set of future capabilities packaged in a “marketecture” that you can’t deploy
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Most large organizations address network security with an army of tactical point tools like firewalls, VPN gateways, IDSs/IPSs, network proxies, malware sandboxes, web and e-mail gateways, etc. This messy array of independent technologies was adequate ten years ago, but now presents a plethora of operational, policy enforcement, and monitoring challenges. Worse yet, network security defenses are becoming less and less effective at blocking targeted and sophisticated threats and advanced malware attacks.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
NSS research indicates that NGFW devices are typically deployed to protect users rather than data center assets, and that the majority of enterprises will not tune the IPS module separately within their NGFW. Therefore, NSS evaluation of NGFW products is configured with the vendor pre-defined or recommended,“out-of-the-box” settings, in order to provide readers with relevant security effectiveness and performance dimensions based upon their expected usage.
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise. An NGFW must be able to: • Integrate security functions tightly to provide highly effective threat and advanced malware protection • Provide actionable indications of compromise to identify malware activity • Offer comprehensive network visibility • Help reduce complexity and costs • Integrate and interface smoothly and transparently with third-party security solutions • Provide investment protection
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
The checklist provided in this document details six must-have capabilities to look for when evaluating a next-generation firewall (NGFW) to determine whether the solution can provide comprehensive protection for your entire enterprise.
Tags : 
cisco, nfgw, next generation firewall, enterprise management, network visibility, malware activity, malware protection, security solutions
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Feb 16, 2016
The need for threat-focused next-generation firewalls (NGFWs) that can effectively mitigate risks that traditional unified threat management (UTM) and point solutions cannot is highlighted by numerous studies, including one from Cisco that reported that every organization should assume it has been hacked. Cisco threat researchers found malicious traffic was visible on 100 percent of the corporate networks that they observed, with evidence that adversaries had often penetrated those networks and were frequently operating undetected over a long period.
Tags : 
network security, threat management, network management
    
Cisco
Published By: Citrix Systems     Published Date: Nov 10, 2014
For the first time in several years, there has been a sharp increase in denial of service (DOS) attacks. In the past, these attacks have been directed at the networks of large companies. Now we are seeing the emergence of attacks targeting smaller companies and higher layers in the computing stack. Intruders are using low-bandwidth attacks disguised as legitimate transactions to bypass firewalls and basic intrusion prevention measures. Organizations need a better way to combat and prevent these attacks, and the right ADC can provide the solution. Learn how Citrix NetScaler can help protect against DOS attacks in the report, Citrix NetScaler: A Powerful Defense Against DOS Attacks (link).
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions
    
Citrix Systems
Published By: Commvault     Published Date: Jul 06, 2016
How do you maintain the security and confidentiality of your organization’s data in a world in which your employees, contractors and partners are now working, file sharing and collaborating on a growing number of mobile devices? Makes you long for the day when data could be kept behind firewalls and employees were, more or less, working on standardized equipment. Now, people literally work on the edge, using various devices and sending often unprotected data to the cloud. This dramatic shift to this diversified way of working has made secure backup, recovery and sharing of data an exponentially more difficult problem to solve. The best approach is to start with a complete solution that can intelligently protect, manage and access data and information across users, heterogeneous devices and infrastructure from a single console - one that can efficiently manage your data for today's mobile environment and that applies rigorous security standards to this function.
Tags : 
commvault, mobile data, file sharing, backup recovery, access, personal cloud approach, data protection, endpoint
    
Commvault
Published By: CompareBusinessProducts     Published Date: Dec 03, 2010
Creating Your Needs Analysis First. When buying networking equipment: routers, switches, firewalls, and network management solutions for your company or organization, it's essential to create a needs analysis first, so that you make the right decisions from multiple standpoints
Tags : 
comparebusinessproducts, enterprise networks, network management, firewall, scalability, infrastructure, security
    
CompareBusinessProducts
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
On March 10, 2008, F5, a leader in application delivery, and WhiteHat Security, an innovator in application security assessment, announced they would be partnering to create an integrated Web application assessment and firewall technology. This product integration will incorporate WhiteHat’s Sentinel assessment technology and F5’s ASM attack blocking technology into a single solution.
Tags : 
web application assessment, defense technologies, whitehat security, web application vulnerabilities
    
F5 Networks Inc
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.