RSS feed Get our RSS feed

News by Topic

next generation firewall

Results 51 - 75 of 132Sort Results By: Published Date | Title | Company Name
By: Forcepoint     Published Date: Mar 08, 2018
Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. Download this whitepaper to find out how Forcepoint NGFW delivers industry leading connectivity and availability.
Tags : server, vpn, network, internet, technology, forcepoint
     Forcepoint
By: Forcepoint     Published Date: Mar 08, 2018
Organizations need to be proactive in managing their network. IT teams need to ensure that it’s available as their organization changes. In our latest e-book, “Securing Hybrid Networks for Dummies,” discover how to structure, manage, and sustain complex hybrid network infrastructures with next generation firewalls. Read the e-book now.
Tags : networks, operations, business, exchange, hardware, software, forcepoint
     Forcepoint
By: Palo Alto Networks     Published Date: Jul 05, 2012
Read this white paper to learn how botnets work and about the role of next-generation firewalls in controlling threats. Download now.
Tags : palo alto, botnets, firewall, malware
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Jul 05, 2012
Palo Alto Networks uniquely delivers on the network security demands found in both types of data center environments.
Tags : palo alto, enterprises, infrastructure
     Palo Alto Networks
By: Palo Alto Networks     Published Date: Jul 05, 2012
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprise-focused, and distinct, many network security vendors are claiming NGFW is a subset of other functions.
Tags : 
     Palo Alto Networks
By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : next-generation firewall, byod, social media, applications, it trends, security
     Cisco
By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : next-generation firewall, byod, social media, applications, it trends, security
     Cisco
By: McAfee     Published Date: Feb 25, 2015
This white paper articulates the business benefits derived by companies that have deployed NGFW.
Tags : ngfw, mobile workforce, security, mcafee, new generation firewall, firewall security, firewall
     McAfee
By: Webroot Inc     Published Date: Jan 15, 2015
The problem with the vast majority of network and endpoint security solutions is that they operate on the premise of static whitelists and blacklists. These lists do not account for the changing nature of URLs, IPs, files and applications, nor for the volume of unknown threats permeating the web, meaning they cannot be used to provide adequate protection. Compounding this problem is that commercial network security technology, such as NGFWs and unified threat management systems, can easily flood the organization’s network security teams with too many alerts and false positives, making it impossible to understand and respond to new threats. As a result, not only do these threats evade the security technology and land with the victim’s infrastructure, but they also have plenty of time to steal sensitive data and inflict damage to the victim’s business. The final characteristic of the latest attacks is how quickly they compromise and exfiltrate data from the organization, compared to the
Tags : firewall, network security, urls, ips, adequate protection, security
     Webroot Inc
By: Forcepoint     Published Date: Jan 03, 2019
How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services. Read the eBook to find out the five information security lessons learned from transitioning to the cloud.
Tags : data security, cloud security, digital transformation, email security, cyber security, secure web gateway, web proxy, ngfw
     Forcepoint
By: Forcepoint     Published Date: Jan 03, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : software-defined wide area network, sd-wan, sd wan, next generation firewall, ngfw, distributed offices, digital transformation, branch security
     Forcepoint
By: Forcepoint     Published Date: Jan 03, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : next generation firewall, ngfw, firewall, network security, branch security, distributed offices, data security, network security
     Forcepoint
By: Forcepoint     Published Date: Jan 03, 2019
Forcepoint Stratgies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn more!
Tags : network security, distributed offices, web security, branch security, digital transformation, data security, cyber security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
Forcepoint Stratgies for Distributed Network Security Financial institutions are facing increasing challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn more!
Tags : network security, distributed offices, web security, branch security, digital transformation, data security, cyber security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : next generation firewall, ngfw, firewall, network security, branch security, distributed offices, data security, network security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
Modernizing the Distributed Enterprise Network Your company is only as agile, connected and secure as its networks are. But making changes to your networks can feel risky, since improving security often means harming connectivity and vice versa. Even still, if your networking approach is inconsistent or labor intensive, it’s probably time for a change. Modernizing the Distributed Enterprise Network investigates how Forcepoint NGFW is changing the status quo and enabling digital transformation efforts: Read Modernizing the Distributed Enterprise Network and take the first step toward true network efficiency.
Tags : software-defined wide area network, sd-wan, sd wan, next generation firewall, ngfw, distributed offices, digital transformation, branch security
     Forcepoint
By: Forcepoint     Published Date: Jan 07, 2019
How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organization’s traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services. Read the eBook to find out the five information security lessons learned from transitioning to the cloud.
Tags : data security, cloud security, digital transformation, email security, cyber security, secure web gateway, web proxy, ngfw
     Forcepoint
By: Forcepoint     Published Date: Feb 26, 2019
Guide to Cloud Connectivity and Security in Distributed Networks Distributed networks are the new reality of today’s mobile, global workforce. Transforming cloud connectivity and security within these networks is the new challenge. Digital transformation initiatives mean that organizations are rapidly shifting the way they do business. Often beginning with cloud application adoption, effective digital transformation requires the ability to fully secure the IT environment, including organizations’ most sensitive data, while employing new technologies at the speed of cloud.
Tags : cloud connectivity, cloud security, distributed network, distributed offices, digital transformation, data security, cloud security, sd-wan
     Forcepoint
By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : next-generation firewall, byod, social media, applications, it trends, security
     Cisco
By: Dell SonicWALL     Published Date: Nov 28, 2012
Why your current firewall may be jeopardizing your security
Tags : firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
     Dell SonicWALL
By: Dell SonicWALL     Published Date: Nov 28, 2012
Dell™ SonicWALL™ thought leaders identify top IT security drivers for the year ahead.
Tags : firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
     Dell SonicWALL
By: Dell SonicWALL     Published Date: Nov 28, 2012
A new IDG survey reveals optimism about the ability of next- generation firewalls to help IT balance productivity and security.
Tags : firewall security, security intelligence, nss svm, next generation firewall, network control, it security, security threats, network management
     Dell SonicWALL
By: Dell SonicWALL     Published Date: Nov 28, 2012
The Impact of Attacks on Your Bottom Line
Tags : firewall security, dell, dell sonicwall, sonicwall, security intelligence, nss svm, next generation firewall, network control
     Dell SonicWALL
By: McAfee     Published Date: Apr 14, 2014
Beyond the basics in a next generation firewall, to protect your investment you should demand other valuable features: intrusion prevention, contextual rules, advanced evasion analytics, secured access control, and high availability.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security
     McAfee
By: McAfee     Published Date: Apr 14, 2014
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, security
     McAfee
Start   Previous    1 2 3 4 5 6    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics