Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
The NSA 4600 from Dell SonicWALL incorporates next-generation firewall technology combined with a multi-core hardware platform to provide robust protection at the perimeter of even some of the most demanding networks.
Students in Georgia were given iPads, but a firewall was impeding network connections...until a solution was found, reports Greg Masters.
The Threat Prevention Appliance from Check Point Technologies provides a solid security platform that can be customized with the addition of several software blades.
A school district in New Hampshire needed to enable its students and faculty to use mobile devices wirelessly, while retaining security and performance control over its network.
To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.
Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.
The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?
The very trends that have revolutionized users' access to data are the same ones that are leaving networks vulnerable to attacks by cyber criminals.
How do we protect a perimeter that does not, physically, exist?
A few years back, I boldly predicted that UTMs would merge into a single product type with gateways and SIEMs. Boy, did I get that wrong!
Nawaf Bitar, a senior exec at Juniper Networks, told attendees that the next world war could very well take place on a cyber battle field.
Though it is difficult to quantify ROI for security initiatives, investment in application security is logical for the enterprise, reports Jim Romeo.
Leaders of businesses, governments and academic institutions must identify vendors of services that provide highly scalable impact because these methods of engagement directly drive revenue and affect brand value.
Converging trends have fused application and network layer functions, causing a fundamental reset of the security operations function.
A critical infrastructure company in Northern California gained visibility into its network...while securing its clients, reports Greg Masters.
A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.