Solid State Firewall Appliances Reports

Approaches to Distributed Denial of Service (DDoS) Protection: A Cost Analysis
sponsored by VeriSign, Inc
WHITE PAPER: Do you know what a Distributed Denial of Service (DDoS) attack might cost your organization? This white paper defines DDoS, examines the elements that make up a DDoS protection solution, and compares three different approaches to DDoS protection. Read this paper to learn how to ramp up protection and reduce costs.
Posted: 07 Jun 2010 | Published: 03 Jun 2010

VeriSign, Inc

Reducing Security Complexity
sponsored by Optus Business
VIDEO: In this webcast, you will be provided with a high level overview of the emerging threats within the Australian security landscape and how these affect midsized organisations.
Posted: 04 Sep 2013 | Premiered: 27 Aug 2013

Optus Business

Presentation Transcript: How Application Whitelisting Can Increase Your Desktop Security
sponsored by Faronics
PRESENTATION TRANSCRIPT: In the past, many security pros relied on one technology to protect their computers and networks. Today, most organizations use several technologies to protect their organization. In this Presentation Transcript, learn how application whitelisting enhances current defenses and covers situations not addressed by firewalls and antivirus utilities.
Posted: 07 Jan 2010 | Published: 07 Jan 2010

Faronics

AMAG Pharmaceuticals Secures Cloud and Mobile While Respecting User Privacy
sponsored by BitGlass
CASE STUDY: In this case study, learn how AMAG Pharmaceuticals successfully secured cloud and mobile usage with a software as a service (SaaS) firewall.
Posted: 13 Jun 2014 | Published: 13 Jun 2014

BitGlass

High Performance Wi-Fi Demystified
sponsored by Xirrus - don't use
PRODUCT LITERATURE: The Xirrus Wi-Fi Array represents the next generation in wireless LAN (WLAN) architectures.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

Xirrus - don't use

Intelligent real-time protection and application control
sponsored by SonicWALL
WHITE PAPER: It is no longer sufficient to rely on outdated firewall technology that only looks at the port, protocol, source IP and destination IP to determine if a session from the outside should be allowed inside the network.
Posted: 17 Mar 2011 | Published: 17 Mar 2011

SonicWALL

Presentation Transcript: Integrating Virtual-Aware Security Technologies
sponsored by Intel
PRESENTATION TRANSCRIPT: There are a growing number of virtual aware security technologies that promise to help you keep data moving between virtual machines safe. This transcript is intended to help you evaluate the technologies and how best to integrate them into your existing network topology for a complete view of activity, vulnerabilities and remediation options.
Posted: 24 Aug 2011 | Published: 24 Aug 2011

Intel

Meeting Branch Office Business Needs for Security and Networking
sponsored by Juniper Networks, Inc.
PRODUCT LITERATURE: Download this white paper and discover an ideal branch-office security strategy that provides fast and secure site-to-site VPN connections. You will also learn about effective tactics that help stop viruses, worms, Spyware and other threats.
Posted: 30 Aug 2006 | Published: 01 Jul 2006

Juniper Networks, Inc.

Information Security Magazine - September 2009: Readers’ Choice Awards
sponsored by Information Security Magazine
EZINE: This issue of Security Information Magazine features the 2009 Readers’ Choice Awards. For the fourth consecutive year, our readers voted to determine the best security products. A record 1,721 voters participated this year, rating products in 17 different categories. There’s also a great article on the facts and myths about encryption and more.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

Information Security Magazine

Network Firewalls
sponsored by Information Security Magazine
JOURNAL ARTICLE: Cisco has been in business for more than 20 years and is emerging as a security powerhouse to be reckoned with, especially as security merges more with network operations in the enterprise.
Posted: 03 Apr 2007 | Published: 01 Apr 2007

Information Security Magazine