Network Firewall Management Reports

Next-Generation IPS for Dummies
sponsored by Sourcefire
EBOOK: Despite the hype, you don't need to replace your firewalls to gain application visibility and control. A Next-Generation IPS (NGIPS) can do this – and even detect and protect against advanced malware – without disrupting your security architecture. Learn what a NGIPS can really do. Download the "Next-Generation IPS for Dummies" eBook.
Posted: 30 Apr 2013 | Published: 01 Jan 2013

Sourcefire

Symantec Endpoint Protection 11.0.3
sponsored by Symantec Corporation
WHITE PAPER: In this Tolly Group competitive performance evaluation, learn how Symantec Endpoint Protection 11.0.3 consistently delivered faster response time than competing products tested.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

Symantec Corporation

Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by TechTarget Networking
EZINE: In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012

TechTarget Networking

E-Guide: Firewall Network Security: Thwarting Sophisticated Attacks
sponsored by Dell SonicWALL
EGUIDE: Consult this expert e-guide for a concise overview of the role that firewalls play in network security, as well as a description of the most sophisticated attack that a firewall can guard against. Discover the extent of firewall coverage by clicking through now.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Dell SonicWALL

E-Guide: Why attackers exploit multiple zero-day attacks and how to respond
sponsored by ESET
EGUIDE: The Stuxnet worm has received significant media coverage for the large number of different types of systems it has infected. Symantec Corp. published an informative technical write-up that explains Stuxnet in detail and reports that around 100,000 systems have been infected.
Posted: 16 Mar 2011 | Published: 16 Mar 2011

ESET

How the Basics of Network Security Have Evolved
sponsored by Fortinet, Inc.
EGUIDE: In this e-guide, networking expert Andrew Froehlich explores some of the fundamental shifts in network security – drilling down into how modern tools work better together, replacing yesterday's isolated, autonomous components. Learn about 4 cutting-edge security tools that every enterprise network should be evaluating in the coming months.
Posted: 09 Jun 2017 | Published: 05 Jun 2017

Fortinet, Inc.

Next Generation Firewalls: Decision Time: Product Benefits and Tradeoffs
sponsored by Dell SonicWALL
EGUIDE: This is the third piece in SearchSecurity.com's three-part guide on Next Generation Firewall products. This expert asset, written by expert Adrian Lane, Analyst & CTO at Securosis, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.
Posted: 19 Nov 2012 | Published: 14 Nov 2012

Dell SonicWALL

Making Networks Virtual: The Latest on SDN Technologies
sponsored by TechTarget Networking
EBOOK: This Technical Guide reviews SDN technologies, network virtualization fundamentals and the latest developments. It provides network engineers the info they need on how to use them in a modern hybrid network architecture.
Posted: 14 May 2014 | Published: 15 May 2014

TechTarget Networking

Managing a Growing Threat: An Executive’s Guide to Web Application Security
sponsored by IBM
WHITE PAPER: Cyber-criminals are leveraging relatively simple application exploits to gain access to sensitive information for fun and profit. It’s more important than ever to implement secure application strategies to effectively protect your business. Read this guide to learn more.
Posted: 12 Mar 2010 | Published: 17 Dec 2007

IBM

Security Beyond Corporate Boundaries: Using Citrix Application Delivery to Protect Corporate Information
sponsored by Citrix
WHITE PAPER: Ensuring your data security goes beyond the implementation of firewalls and spyware. This white paper discusses key information on virtualization deployment, and offers tips to better manage your disaster recovery enviroment.
Posted: 05 May 2008 | Published: 01 Apr 2008

Citrix