Network Firewalls
By: Information Security Magazine View more from Information Security Magazine >>
Download this next:
Running Cisco Firepower Virtual Firewall on EndaceProbe
By: Endace
Type: Product Demo
Your network, like every network, is in danger of being attacked by the many emerging and complex threats in the cyber landscape.
So, how can you augment your defense measures?
This video introduces one avenue toward enhanced network security: running Cisco Firepower Virtual Firewall on EndaceProbe.
View now to unlock the demo.
These are also closely related to: "Network Firewalls"
-
E-Guide: Configure Outbound Firewall Rules for Data Protection
By: TechTarget Security
Type: eGuide
A new generation of application aware firewalls has been developed to ward off more sophisticated threats. While firewalls have been a form of security networks for nearly 25 years, modern threats are creating the need to update traditional firewall practices.
Consult this expert E-guide to learn more about the transformation of firewalls and how a next-generation firewall can improve your businesses security.
-
Thwarting Sophisticated Attacks with Today’s Firewalls
By: TechTarget Security
Type: eGuide
IT managers today are questioning the effectiveness of firewalls as network perimeters continue to expand and new Web 2.0 threats emerge. This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewalls (NGFWs) and unified threat management (UTM).
Find more content like what you just read:
-
Analyst report: Network firewall landscape
By: Palo Alto Networks
Type: Gartner Magic Quadrant
By 2026, Gartner predicts, more than 60% of businesses will have more than one type of firewall deployment. To help organizations select the network firewalls that can best meet their needs, this Gartner Magic Quadrant report overviews the market and vendors. Read on to compare 17 firewall providers.
-
Tools for supporting your security analysts
By: Endace
Type: Product Overview
To ensure that your security incident investigations are successful, your analysts need access to definitive evidence. Download this overview to learn how, by leveraging Cisco and Endace tools, you can deliver that evidence to your analysts.
-
Cisco Catalyst: Future of secure, resilient networking
By: Zones, Inc.
Type: eBook
Cisco Catalyst switches are designed to withstand rising connectivity demands. Featuring AI, ML, security, and efficiency, Catalyst optimizes networks. Read this white paper to discover how Catalyst's modular components create an ecosystem that reduces complexity and downtime.
-
E-Book: Technical Guide on Web Application Firewalls
By: TechTarget Security
Type: eBook
Web application firewalls are becoming critical data protection and compliance tools that any security decision maker must understand. SearchSecurity.com presents a comprehensive guide to Web Application Firewalls in which experts examine evaluation criteria, deployment considerations and management issues.
-
NIS2 compliance requirements and solutions for industrial operations
By: Cisco
Type: Product Overview
NIS2 compliance is complex for industrial organizations. Cisco helps by securing IACS infrastructure and supply chain with its Cyber Vision visibility tool, ISE network access control, and Secure Equipment Access remote access. Read how Cisco's comprehensive OT security solutions enable NIS2 compliance.
-
NIS2: Building for a more secure future
By: Cisco
Type: Webcast
The Network and Information Systems Directive (NIS2) was designed to provide the EU with a path towards greater security. In this webcast, Cisco’s Albert Camus is joined by a panel of experts to discuss the state of NIS2 regulations and how professionals can use the compliance to bolster their OT security. Watch now to learn more.
-
Real-time demonstration of Cisco CyberVision3
By: Cisco
Type: Product Demo
Modern industrial environments host a wide variety of devices, clouds, and networks, making them difficult to secure. Cisco’s Industrial Security Framework and the Cisco CyberVision solution are engineered to help organizations establish visibility across their complex industrial environments. Watch this demo of Cisco CyberVision to learn more.
-
Strengthen Your Incident Response with Endace and Cisco
By: Endace
Type: Product Overview
When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.
-
How Cisco solves remote OT challenges
By: Cisco
Type: Product Overview
Remote access is key to being able to configure, manage, and troubleshoot Operational Technology (OT) assets without time-consuming and costly site visits.With Secure Equipment Access (SEA), Cisco aims to solve these challenges. Download this product overview now to explore the benefits of Cisco SEA.
-
E-Guide: Using web application firewalls to ease compliance efforts
By: TechTarget Security
Type: eGuide
When properly maintained, Web application firewalls help organizations ease PCI management and compliance obligations. This expert guide highlights the various compliance benefits WAF provide and explains how they can also be used to protect against both common and emerging threats.
-
The impact of compute-intensive workloads on network infrastructure
By: Panduit
Type: White Paper
In this white paper, join Cisco and Panduit as they describe some of the trends in data center connectivity and the impact this compute-intensive workload have on cabling and network infrastructure design with corresponding deployment guidelines.
-
Securing your edge network: Quick guide
By: Fortinet, Inc.
Type: Product Overview
To secure their edge networks, many organizations have leveraged a hybrid mesh firewall. In this overview, discover how such a firewall can protect your network in 3 key ways.
-
Enhancing network experiences with an AI-powered platform
By: Cisco & Rhingle
Type: Infographic
This infographic explores 3 key ways that an AI-powered platform can enhance your organization’s network experiences. #1: By facilitating interruption-free networking. Keep reading to discover the rest.
-
Top 10 networking stories of 2019
By: TechTarget ComputerWeekly.com
Type: eGuide
Until Tuesday 10 December, it would have been absolutely fair to say that 2019 was the year of software-defined networking. And then, on 11 December, Cisco unveiled the basis of what it called the internet for the future. Hardware was very much back to the future. Here are Computer Weekly's top 10 networking stories of 2019.
-
2023 analyst report: Network management market
By: Auvik Networks, Inc.
Type: Analyst Report
In this 2023 analyst report, find out how 27 network management tools stack up against each other.
-
How can you augment your firewall’s abilities?
By: Integrity360
Type: Blog
As cyberthreats increase in complexity and number, firewalls present to businesses the opportunity to block threats at the network perimeter. To augment your firewall’s abilities, Integrity360 has developed Managed Next Generation Firewall Service. Explore this case study to explore the service’s offerings.
-
Are there blind spots in your Industrial Control Systems (ICS)?
By: Cisco
Type: Product Overview
Are blind spots and visibility issues in your Industrial Control Systems (ICS) leaving your organization vulnerable to cyber threats? Cisco Cyber Vision provides organizations with visibility into their ICS, improving their industrial networks efficiency, and extending IT security to their industrial operations. Read on to learn more.
-
Industrial security: The importance of visibility
By: Cisco
Type: Product Overview
As you digitize your industrial operations and deploy Industry 4.0 technologies, the deeper integration between IT, cloud, and industrial networks is exposing your systems to cyberthreats. Download this product overview to learn how Cisco Cyber Vision brings unprecedented scale and simplicity to industrial security.
-
How Cisco helps you connect and manage OT assets
By: Cisco
Type: Product Overview
Cisco Secure Equipment Access (SEA) empowers operations teams to easily connect to remote Operational Technology (OT) assets for configuration, maintenance, and troubleshooting. Download this product overview to learn more and unlock a comprehensive feature list of Cisco’s SEA different capabilities.
-
Analyst report: SD-WAN market overview
By: Palo Alto Networks
Type: Gartner Magic Quadrant
To compare 14 top SD-WAN vendors – including Fortinet, Palo Alto Networks and VMware – take a look through this Gartner Magic Quadrant report.
-
2024 economic analysis of next-gen firewalls
By: Palo Alto Networks
Type: Forrester Total Economic Impact Report
As cyberthreats evolve, so must firewalls. So, what capabilities should a next-generation firewall maintain? And what cost savings can such a firewall enable? Unlock answers in this 2024 Forrester Total Economic Impact report on Palo Alto Networks’ ML-powered next-generation firewalls (NGFWs).
-
Unified Communication: “It should work as easily as a telephone call!”
By: TechTarget ComputerWeekly.com
Type: Essential Guide
This article in our Royal Holloway Information Security series explains the security implications of unified communication.
-
The technological evolution of IT industry leaders: Part one
By: TechTarget ComputerWeekly.com
Type: eGuide
This first part of this e-guide explores the technological evolution of Oracle, Cisco and Dell throughout the past two decades, including the technologies that have risen to the forefront, from real-time analytics and data management to Cisco's edge computing ambitions.
-
Hybrid mesh firewalls: Adoption roadmap
By: Fortinet, Inc.
Type: eBook
By 2026, Gartner predicts, over 60% of organizations will have more than 1 type of firewall deployment, which will prompt adoption of hybrid mesh firewalls. So, what should you know about hybrid mesh firewalls? Unlock insights in this 17-page guide.
-
Analyst report: SSE market overview
By: Palo Alto Networks
Type: Gartner Magic Quadrant
To advance their security postures, many businesses have leveraged a security service edge (SSE) product. Along with mapping out the key and optional capabilities of an SSE solution, this Gartner Magic Quadrant report overviews the SSE vendor landscape. To review these insights in full, read on.
-
Top networking trends: Multicloud adoption, hybrid work connectivity, & more
By: Cisco
Type: Research Content
Download a copy of the Global Networking Trends Report for yourself to explore how your peers are deploying and evolving their networks to support secure connectivity. Inside, you’ll find 6 cloud networking and network security best practices, detailed survey response data, and more.
-
How a next-generation firewall prevents application-layer attacks
By: TechTarget Security
Type: eGuide
The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.
-
How SD-WAN can advance your network infrastructure
By: Core BTS
Type: White Paper
Cisco has upgraded its SD-WAN with direct cloud service access, including Office 365. Explore how SDN and SD-WAN can advance your network infrastructure in this white paper.
-
SASE put to the test: Top tools and vendors, compared
By: Palo Alto Networks
Type: eBook
To find out how three SASE products – Cisco Umbrella, Palo Alto Networks Prisma Access Enterprise and Zscaler Internet Access – stack up against each other, read this 20-page report by AV Comparatives.
-
The government & security resiliency: Webcast
By: Endace
Type: Webcast
In discussion with Endace’s Michael Morris, Cisco Systems’ Senior National Security and Government Strategist provides his thoughts on cybersecurity standards and the risks in today’s landscape. The two consider how government agencies could promote bolstered security resiliency. Watch now to unlock their conversation in full.
-
5-page guide to enhancing access security
By: Cisco & Rhingle
Type: Product Overview
To learn how you can enhance access security for your highly distributed workforce, take a look through this 5-page guide by Cisco.
-
Regain visibility into your industrial environments
By: Cisco
Type: Video
The increased connectivity that defines and fuels digital industrial environments has led to an increase in exposure to threats. Cisco CyberVision is designed to see through this tangled web of interconnected clouds, systems, and devices, to deliver visibility and prevent threats from becoming attacks. Watch now to learn more.
-
Evaluating the SOAR market
By: Palo Alto Networks
Type: Analyst Report
To choose the right security orchestration, automation and response (SOAR) tool for your organization, first, you must determine the functionality and value that you need the solution to deliver. Have you already done so? Then it’s time to explore the market and its many options. Check out this Forrester report to compare 31 SOAR providers.
-
E-Guide: Shortcut guide to Web application firewall deployment
By: TechTarget Security
Type: eGuide
Before purchasing a Web application firewall (WAF), there are several factors all organizations must consider. This expert tip offers advice on how to pick a WAF that best fits your organization and lays out the steps for successful deployment.
-
64-page e-book: Ultimate guide to software firewalls
By: Palo Alto Networks
Type: eBook
Between expanding attack surfaces and proliferating, sophisticated threats, organizations in every industry face complex obstacles on the path to stronger cloud application security. To learn how leveraging a software firewall can help you protect your business’s cloud apps, dig into this comprehensive guide.
-
Building industrial security capabilities to drive compliance
By: Cisco
Type: White Paper
With an increase in cyberattacks, organizations in the industrial sector need to invest significant resources in understanding their responsibilities and ensuring compliance. This white paper details the main requirements of NIS2 and how organizations can benefit from the Cisco security portfolio to drive compliance. Read on to learn more.
-
Expert E-Book: Data Security and the Cloud
By: TechTarget Security
Type: eBook
This e-book will cover encryption and key management, infrastructure risks, data integrity, and access control, all in the context of cloud computing.
-
Palo Alto Networks BPA+ Review Partner Update
By: Nexum
Type: Blog
What has your firewall done for you lately? According to Gartner, through 2023, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.I know what you’re thinking. Access this blog to learn how Palo Alto Networks has already made things easy for you with their Best Practice Assessment Plus (BPA+).
-
Compare 3 Leading SASE Solutions
By: Palo Alto Networks & Insight
Type: Analyst Report
SASE solutions aim to simplify system management by allowing IT administrators to easy manage all the necessary security measures and access permissions from a single cloud-based management architecture. Tap into this comparative report of SASE offerings by Palo Alto Networks, Cisco and Zscaler broken down by 8 sub-tests.
-
Quantifying the Value of FlexPod Converged Infrastructure
By: NetApp & Cisco
Type: White Paper
Learn how upgrading your converged infrastructure to FlexPod with Cisco M4 servers and All Flash FAS (AFF) storage can benefit your organization
-
Texas district boosts IT security & efficiency
By: Fortinet, Inc.
Type: Case Study
Athens ISD in Texas enhanced its cybersecurity using Fortinet's Security Fabric. They selected Fortinet for easier firewall management, better network visibility, and integrated endpoint protection. Discover how Fortinet benefited Athens ISD in our case study.
-
Fast facts: Securing hybrid workforces
By: Cisco & Rhingle
Type: Infographic
78% of organizations support a mix of employees working in the office and remotely, according to the “2023 Security Service Edge (SSE) Adoption Report.” So, how can these organizations best secure their hybrid workforces? Tap into this infographic for insights.
-
How Analysts Can Confidently Remediate Security Incidents
By: Endace
Type: Product Demo
In this video, Endace’s Michael Morris demonstrates an integration and workflow between Endace, Cisco Firepower and Splunk Enterprise. View now to understand how the workflow can enable analysts to more confidently remediate security incidents.
-
The growth of cloud-based networking: What to expect in 2022 and beyond
By: TechTarget ComputerWeekly.com
Type: eBook
By upgrading to advanced network infrastructure, firms can deliver mission-critical services through cloud providers and through their own cloud resources. These increased capacity need has seen deployment of optical networking and advanced network solution such as software-defined wide area network (SD-WAN). Read more in our exclusive e-guide.
-
15 non-negotiable firewall capabilities
By: Palo Alto Networks
Type: Buyer's Guide
As network perimeters have evolved, firewalls have too. So, what constitutes a modern firewall? This buyer’s guide maps out 15 non-negotiable capabilities. Keep reading to access those insights and more.
-
Next Generation Network Management Techniques
By: TechTarget Security
Type: Ezine
The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
-
The solution to overcoming public cloud security challenges
By: Palo Alto Networks
Type: Webcast
Tune in to this ESG webinar to find the secrets to achieving simplicity, scale, and security with Google Cloud NGFW Enterprise, powered by Palo Alto Networks.