Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
The NSA 4600 from Dell SonicWALL incorporates next-generation firewall technology combined with a multi-core hardware platform to provide robust protection at the perimeter of even some of the most demanding networks.
Students in Georgia were given iPads, but a firewall was impeding network connections...until a solution was found, reports Greg Masters.
The Threat Prevention Appliance from Check Point Technologies provides a solid security platform that can be customized with the addition of several software blades.
McAfee found that 60 percent of 504 surveyed IT professionals prioritize security as the primary driver of network design.
Many of the vulnerabilities can lead to a denial-of-service condition, but others could result in a full compromise of the affected system.
To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.
Off the field, demand for bandwidth and protection from network threats set the ball in motion for the Denver Broncos. Greg Masters reports.
Today's advanced persistent threats (APTs) evade traditional security controls with techniques such as SSL encryption and require an integrated, simple and automated approach that can detect and defend at each stage of an attack.
The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?
The very trends that have revolutionized users' access to data are the same ones that are leaving networks vulnerable to attacks by cyber criminals.
How do we protect a perimeter that does not, physically, exist?
A few years back, I boldly predicted that UTMs would merge into a single product type with gateways and SIEMs. Boy, did I get that wrong!
Nawaf Bitar, a senior exec at Juniper Networks, told attendees that the next world war could very well take place on a cyber battle field.
Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.
Leaders of businesses, governments and academic institutions must identify vendors of services that provide highly scalable impact because these methods of engagement directly drive revenue and affect brand value.
Converging trends have fused application and network layer functions, causing a fundamental reset of the security operations function.
A critical infrastructure company in Northern California gained visibility into its network...while securing its clients, reports Greg Masters.
A group of prominent security professionals forecast the significant industry shifts in 2014. Greg Masters compiles the responses.