Your search for next-generation firewall returned 16 results.

Sort results:

Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.

News Operators disable firewall features to increase network performance, survey finds

Operators disable firewall features to increase network performance, survey finds

McAfee found that 60 percent of 504 surveyed IT professionals prioritize security as the primary driver of network design.

News Cisco addresses numerous vulnerabilities in ASA software

Cisco addresses numerous vulnerabilities in ASA software

Many of the vulnerabilities can lead to a denial-of-service condition, but others could result in a full compromise of the affected system.

Opinion The systems management imperative: Achieving more effective perimeter security from the inside out

The systems management imperative: Achieving more effective perimeter security from the inside out

To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.

Case Study Forward progress: How the Denver Broncos really play defense

Forward progress: How the Denver Broncos really play defense

Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.

Webcast

An Enterprise Security Platform Approach to Advanced Persistent Threats

Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.

Blog Post The 'human firewall': a more proactive approach to infosec

The 'human firewall': a more proactive approach to infosec

The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?

News 2015 SC Awards U.S. Finalists: Round One

2015 SC Awards U.S. Finalists: Round One

Round one of the 2015 SC Awards U.S. finalists includes categories for best advanced persistent threat protection, mobile security solution, vulnerability management solution, and the Excellence Award for best SME security solution.

Blog Post Time to rethink network security

Time to rethink network security

The very trends that have revolutionized users' access to data are the same ones that are leaving networks vulnerable to attacks by cyber criminals.

News Google publishes Windows 8.1 flaw details before patch is issued

Google publishes Windows 8.1 flaw details before patch is issued

Google's "Project Zero" team discovered an elevation of privilege flaw in Windows 8.1 and detailed the vulnerability online, 90 days after alerting Microsoft.

News 2015 SC Awards U.S. Finalists

2015 SC Awards U.S. Finalists

The highly anticipated SC Awards U.S. are just around the corner. Here's the full list of finalists competing to take home a trophy on the big night in San Francisco.

Feature Smart defense: A talk with industry veteran Gene Fredriksen

Smart defense: A talk with industry veteran Gene Fredriksen

Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.

News RSA 2015: Experts discuss six dangerous attack techniques

RSA 2015: Experts discuss six dangerous attack techniques

Data breaches, ransomware, and threats against industrial control system were were discussed during an RSA Conference 2015 session on dangerous attack techniques.

Feature And a little child shall secure them: The next generation of CISOs

And a little child shall secure them: The next generation of CISOs

You're never too young to learn about information security, Teri Robinson reports.

Blog Post The shift from IAM to Identity Relationship Management

The shift from IAM to Identity Relationship Management

Leaders of businesses, governments and academic institutions must identify vendors of services that provide highly scalable impact because these methods of engagement directly drive revenue and affect brand value.

Review 2014 Industry Innovators: Perimeter defense

2014 Industry Innovators: Perimeter defense

This is another market area that has seen a lot of change over the past few years.

Feature An epic ride: A look back at the ever-changing information security industry

An epic ride: A look back at the ever-changing information security industry

Over the past quarter century, corporate information security has come into its own, reports Karen Epper Hoffman.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US