Search Results for: firewall webcast

How a next-generation firewall prevents application-layer attacks
The application awareness of next-generation firewalls (NGFW) provides security IT teams with new opportunities and challenges. Read this expert E-Guide to discover how a NGFW prevents application-layer attacks and why they are important to consider as a form of defense for the enterprise.

TechTarget Security

Thwarting Sophisticated Attacks with Today’s Firewalls
This expert resource explores modern network security, offering key insight into fighting today’s sophisticated threats as well as the differences between next-generation firewall (NGFW) and unified threat management (UTM).

TechTarget Security

E-Guide: Firewall Network Security: Thwarting Sophisticated Attacks
Consult this expert e-guide for a concise overview of the role that firewalls play in network security, as well as a description of the most sophisticated attack that a firewall can guard against. Discover the extent of firewall coverage by clicking through now.

Dell SonicWALL

Cisco ASA 5500 Series Adaptive Security Appliance
In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.

Cisco Systems, Inc.

Presentation Transcript: The New Branch Office - Simply Connected
This is a presentation transcript of a webcast dedicated to learning about branch offices: the challenges, solutions, and how to keep them secure.

Juniper Networks, Inc.

Web application firewalls: How they can help protect customers
In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.

Astaro

Aviatrix Systems Video 2
How can you simplify the security of your cloud applications while reducing costs? Watch this webcast, which features leaders from Aviatrix, to find out.

TOPICS: .NET
Aviatrix Systems

How can organizations get control over privileged identity management?
Recent research showed 72% of temporary workers and contractors are given administrative privileges on their employers' systems. Explore this expert e-guide to learn how you can improve the security of privileged access by minimizing exposure of sensitive activities and information

One Identity

Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.

Juniper Networks, Inc.

Security Products for Protection: Endpoint and Anti-Malware
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

Carbon Black