Firewalls White Papers

A Firewall is a piece of hardware and/or software which functions in a networked environment to prevent some communications forbidden by the security policy, analogous to the function of firewalls in building construction. A firewall is also called a Border Protection Device (BPD), or packet filter in BSD contexts. A firewall has the basic task of controlling traffic between different zones of trust.
Results 1 - 25 of 280Sort Results By: Published Date | Title | Company Name
By: iboss     Published Date: Jan 22, 2018

While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.

Tags : iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, wireless security, data protection, business technology, mobile device management
    
By: Kaspersky     Published Date: Aug 17, 2016

Download our eBook to learn what you can expect from the oncoming wave of connected “things.”

Tags : kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls, hacker detection, data protection, mobile device management, data loss prevention
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

Download this paper now to learn how you can prevent such an attack and protect your business

Tags : prevent cyber-attacks, cyber-attacks, security application, security, anti spam, anti spyware, anti virus, application security, encryption, firewalls, internet security, security management
    
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall, mobile security, network security, email security, firewalls, hacker detection, internet security, intrusion prevention, security policies, wireless security, return on investment, business technology, data loss prevention
    
By: Code42     Published Date: Apr 22, 2016

The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.

Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, security management, data loss prevention
    
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

As organizations embrace smartphones, tablets and mobile applications, they are moving beyond simply providing mobile email and browser capability to offering mobile access to Windows-based and other corporate applications.

Tags : citrix, mobile, deployment, app, email security, firewalls, mobile computing, best practices, customer satisfaction, windows, data protection, collaboration, content delivery, customer experience management, messaging, secure content management, mobile device management, data loss prevention
    
By: Kaspersky     Published Date: Jan 22, 2016

Hardly a day goes by without the discovery of a new cyber threat somewhere in the world! But how do you keep up with new malware and evolving cybercriminal tricks?

Tags : kaspersky, cybercrime, hackers, malware, threat protection, network security, firewalls, hacker detection, intrusion prevention, vulnerability management
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn what traditional network security solutions can’t do and why your organization needs a web application firewall as a cornerstone of its IT security strategy

Tags : citrix, web application, firewall, security, network security, remote access, firewalls, hacker detection, internet security, intrusion prevention
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.

Tags : citrix, cyberthreat, report, defense, network security, email security, firewalls, network security appliance
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Get an overview of the cyberthreat landscape and see key findings from the “2015 Cyberthreat Defense Report.”

Tags : citrix, cyberthreat, infographic, 2015 report, application security, firewalls, hacker detection, intrusion prevention, data protection, secure content management, data loss prevention
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

The SVM illustrates the relative value of security investment options by mapping security effectiveness and value of tested product configurations. The SVM provides an aggregated view of the detailed findings from NSS Labs’ group tests.

Tags : citrix, firewall, security, svm, firewalls, intrusion prevention, web service security, data protection
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

Learn how NetScaler with Unified Gateway provides One URL for secure remote access and helps reduce TCO, simplifies IT, strengthens security and ensures a high-definition experience for both mobile and traditional application users.

Tags : citrix, security, remote access, delivery, infrastructure, access control, email security, firewalls, mobile computing, service management
    
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016

The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value of tested product configurations.

Tags : citrix, waf, firewall, tco, security, network security, application security, firewalls
    
By: Juniper Networks     Published Date: Oct 19, 2015

Next-Generation Firewalls Deliver Better Protection Through Application-Aware Security and User Role-Based Controls.

Tags : juniper, firewall, application, security, protection, data, network, firewalls, application integration, application performance management, business intelligence, business management
    
By: Sophos     Published Date: Oct 07, 2015

This guide covers the key factors you should consider when evaluating UTM and Next Gen Firewall solutions.

Tags : unified threat management, firewalls, utm, firewall solutions, security, security technology, protection, utm systems, network security, application security, email security, encryption, internet security
    
By: Sophos     Published Date: Oct 07, 2015

This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.

Tags : endpoint buyers, vendors, endpoint security solution, antivirus, security solutions, security, security threats, endpoint buyers guide, endpoint security solution, application security, disaster recovery, email security, encryption, firewalls, intrusion detection, intrusion prevention
    
By: Centrify     Published Date: Sep 08, 2015

Download this white paper to learn about managing and securing Macs and other mobile devices.

Tags : device management, security management, mobility, application security, management solutions, anti spyware, firewalls, password management, security policies
    
By: Kaspersky     Published Date: Aug 27, 2015

Download Debunking the Top 5 Security Implementation Myths to learn why staying with your current, inferior technology costs your business more money in the long run.

Tags : kaspersky, attacks, cyberattacks, business process, security costs, it budget, network security, anti virus, email security, firewalls, hacker detection, intrusion prevention, security management, wireless security, it spending, total cost of ownership, secure content management, business technology
    
By: Venafi     Published Date: Aug 07, 2015

It was recently found that most Global 2000 organisations have failed to completely remediate Heartbleed. This leaves these organisations vulnerable to cyberattacks, future brand damage, and intellectual property loss.

Tags : cyberattacks, security, cybercriminals, security application, access control, anti spam, anti spyware, anti virus, application security, firewalls, internet security, security management, security policies
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.

Tags : cyber attack, protection, security, network, business continuity, compliance, firewalls, productivity, vulnerability management
    
By: Venafi     Published Date: Jul 27, 2015

See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.

Tags : security controls, key misuse, certificate misuse, security management, breach prevention, risk reduction, blind spots, exfiltrating data, certificate security, trust protection platform, application security, disaster recovery, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, network security appliance, vulnerability management
    
By: Venafi     Published Date: Jul 27, 2015

To learn how, Raxis reconstructed a real-world attack that targeted and compromised a global bank, using technologies and methods that could be used to breach many organizations today.

Tags : cybersecurity, breach prevention, penetration testing, next generation trust protection, cyber attacks, it security, cryptographic keys, digital certificates, security controls, access control, application security, encryption, firewalls, hacker detection, internet security, intrusion detection, intrusion prevention, ssl, web service security, vulnerability management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End