firewall

Results 401 - 410 of 410Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Jun 22, 2017
Juniper’s security solutions seamlessly extend across private and public cloud architectures without compromising security, flexibility, and manageability. With midrange, high-performance, space-efficient, next-generation firewalls, smarter and faster centralized management, and highly evolved security intelligence and automation tools, Juniper Networks allows you to secure your network, keep operational costs down, and easily migrate to a hybrid cloud architecture. For more information about Juniper’s security solutions, please visit us at www.juniper.net/us/en/products-services/security and contact your Juniper Networks representative.
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The dramatic growth of hybrid cloud deployments is creating new challenges for security professionals that can no longer be addressed with legacy technologies, policies and processes. As applications and data move fluidly between multiple clouds private, public and hybrid—organizations must take a unified approach to security that incorporates a range of products working hand in glove to reduce risk and protect the business.
Tags : 
cloud, malware protection, compromised files, threat intelligence, security director, virtual firewall, atp, srx
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
As networks scale, they become difficult to manage. A different command line interface (CLI) or operating system (OS) is required for every device type in your network, such as routers, switches, and firewalls. Learning a new OS for every device is a complex task for your operations team and can slow them down—not a very efficient way to run a network.
Tags : 
r&d, drive innovation, automation delivery, critical networks, solutions, lifetime warranty, juniper networks
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
In most cases, your physical data center will not disappear as these growth trends play out. Instead, it will evolve into a hybrid environment, incorporating a mixture of physical and virtual computing technologies—including both public and private clouds. You’ll face even more challenging security risks within these hybrid environments than you have protecting your physical data center today. And you won’t be alone with these challenges when making the shift to a hybrid data center architecture.
Tags : 
intrusion prevention, data attacks, firewall, junos space virtual director, appsecure, unified management, centralized platform
    
Juniper Networks
Published By: Cisco EMEA     Published Date: May 15, 2018
Il Gruppo Marcegaglia conferma una strategia di sicurezza IT basata su soluzioni Cisco che va dagli strumenti di firewall al sistema di Next-Generation Intrusion Prevention System passando per la gestione centralizzata. Il Gruppo Marcegaglia è la realtà industriale leader mondiale nella trasformazione dell’acciaio che opera dall’Italia a livello globale, con una presenza di 43 stabilimenti distribuiti su una superficie complessiva di 6 milioni di metri quadrati. Fanno parte del Gruppo 7.000 dipendenti, 60 unità e 210 rappresentanze commerciali per un fatturato che, nel 2013, è stato di oltre 4 miliardi di euro nel settore dell’acciaio e diversificate. Il tutto grazie alla produzione quotidiana di 5.500 chilometri di manufatti in acciaio inossidabile e al carbonio per oltre 15.000 clienti, per un totale di oltre 5 milioni di tonnellate lavorate ogni anno.
Tags : 
    
Cisco EMEA
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Visionary for 2nd year in a row, in the Gartner 2018 Magic Quadrant for NGFW Gartner has named Forcepoint sole Visionary in their 2018 Magic Quadrant for NGFW, for ability to execute and completeness of vision. According to Gartner, “In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.”*
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jul 30, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity
Published By: Cisco Umbrella EMEA     Published Date: Feb 06, 2019
The average company uses more than 50 security vendors. Firewalls, Web proxies, SIEM, Appliances & Third-party intelligence. The list goes on — and sometimes you still find your stack coming up short when it comes to securing users anywhere they access the internet. Strengthening your security stack doesn’t mean a massive overhaul or a loss of customization and control. Check out these 6 ways to amplify and extend your stack with cloud security from Cisco Umbrella.
Tags : 
    
Cisco Umbrella EMEA
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17     Next   End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.