Your search for next-generation firewall returned 18 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

Product Review Dell SonicWALL NSA 4600

Dell SonicWALL NSA 4600

The NSA 4600 from Dell SonicWALL incorporates next-generation firewall technology combined with a multi-core hardware platform to provide robust protection at the perimeter of even some of the most demanding networks.

Case Study Case study: Wire transfer

Case study: Wire transfer

Students in Georgia were given iPads, but a firewall was impeding network connections...until a solution was found, reports Greg Masters.

Product Review Check Point Next Generation Threat Prevention Appliance

Check Point Next Generation Threat Prevention Appliance

The Threat Prevention Appliance from Check Point Technologies provides a solid security platform that can be customized with the addition of several software blades.

News Operators disable firewall features to increase network performance, survey finds

Operators disable firewall features to increase network performance, survey finds

McAfee found that 60 percent of 504 surveyed IT professionals prioritize security as the primary driver of network design.

News Cisco addresses numerous vulnerabilities in ASA software

Cisco addresses numerous vulnerabilities in ASA software

Many of the vulnerabilities can lead to a denial-of-service condition, but others could result in a full compromise of the affected system.

Opinion The systems management imperative: Achieving more effective perimeter security from the inside out

The systems management imperative: Achieving more effective perimeter security from the inside out

To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.

Case Study Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Webcast

An Enterprise Security Platform Approach to Advanced Persistent Threats

Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.

Blog Post The 'human firewall': a more proactive approach to infosec

The 'human firewall': a more proactive approach to infosec

The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?

Blog Post Time to rethink network security

Time to rethink network security

The very trends that have revolutionized users' access to data are the same ones that are leaving networks vulnerable to attacks by cyber criminals.

Review 2013 Industry Innovators: Perimeter defense

2013 Industry Innovators: Perimeter defense

How do we protect a perimeter that does not, physically, exist?

Review UTMs are still defining themselves

UTMs are still defining themselves

A few years back, I boldly predicted that UTMs would merge into a single product type with gateways and SIEMs. Boy, did I get that wrong!

News

RSA 2014: Security exec talks cyber warfare and industry's breaking point

Nawaf Bitar, a senior exec at Juniper Networks, told attendees that the next world war could very well take place on a cyber battle field.

Feature Smart defense: A talk with industry veteran Gene Fredriksen

Smart defense: A talk with industry veteran Gene Fredriksen

Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.

Blog Post The shift from IAM to Identity Relationship Management

The shift from IAM to Identity Relationship Management

Leaders of businesses, governments and academic institutions must identify vendors of services that provide highly scalable impact because these methods of engagement directly drive revenue and affect brand value.

Blog Post 2014: The year network security operations become orchestrated

2014: The year network security operations become orchestrated

Converging trends have fused application and network layer functions, causing a fundamental reset of the security operations function.

Case Study Case study: Network clarity

Case study: Network clarity

A critical infrastructure company in Northern California gained visibility into its network...while securing its clients, reports Greg Masters.

Feature A look ahead: Forecasts for 2014

A look ahead: Forecasts for 2014

A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US