The SonicWALL Approach to Consolidating Network Security Infrastructure and Cutting Costs
sponsored by SonicWALL
BROCHURE:
This brochure identifies the substantial benefits available to organizations that elect to replace their network security point products with UTM devices. It explains the combination of innovative features/functions and robust, platform-level capabilities that enable customers of SonicWALL UTM products to maximize their gains due to consolidation.
Posted: 24 Jul 2009 | Published: 24 Jul 2009
|
|
|
Information Security Magazine, May 2009: Automating Compliance
sponsored by Information Security Magazine
EZINE:
This month's cover story is on Automatic Compliance. The weight of regulatory compliance can break the back of your IT operation. Automation can help you gear up for your next audit. We'll also cover new technologies for identity and access management, IDS vs. IPS, and more.
Posted: 11 May 2009 | Published: 01 May 2009
|
|
|
Security Appliances: New Strides in Preventing Intrusions
sponsored by IBM
WHITE PAPER:
According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
IBM Security Event and Log Management Service
sponsored by IBM
SERVICE LISTING:
With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
Posted: 18 Feb 2009 | Published: 18 Feb 2009
|
|
|
Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER:
This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008
|
|
|
Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
sponsored by MarkMonitor
CASE STUDY:
Nationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
Posted: 10 Oct 2008 | Published: 09 Oct 2008
|
|
|
Anti-X and the Mob: Addressing Content-Borne Threats with Unified Threat Management
sponsored by Juniper Networks, Inc.
WEBCAST:
Register for this webcast to learn more about the anatomy of a modern blended attack and how Unified Threat Management from Juniper Networks can help stop these threats at various points of their progression.
Posted: 30 Sep 2008 | Premiered: Sep 30, 2008
|
|
|
Getting the Most from Your Wireless Network
sponsored by WildPackets, Inc.
WHITE PAPER:
Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee.
Posted: 26 Aug 2008 | Published: 26 Aug 2008
|
|
|
Cisco ASA 5500 Series Adaptive Security Appliance
sponsored by Cisco Systems, Inc.
WEBCAST:
In this webcast learn how you can use Cisco ASA 5500 Series Adaptive Security Appliances to deploy advanced security while simplifying your network architecture and IT management.
Posted: 07 Aug 2008 | Premiered: Aug 1, 2008
|
|
|
Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER:
The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005
|
|
|
The Cybercrime Arms Race
sponsored by Kaspersky
WHITE PAPER:
Read this white paper and find out how cybercrimes have become so pervasive and how these sophisticated attacks work. Discover today's cybercrime techniques and how to recognize them.
Posted: 18 Feb 2008 | Published: 01 Feb 2008
|
|
|
Drive business value with innovation for security defense
sponsored by IBM
WHITE PAPER:
This white paper details an integrated approach to security that can help your company address security threats while supporting compliance and protecting data, Internet-based systems, physical environments and applications.
Posted: 06 Dec 2007 | Published: 01 Apr 2007
|
|
|
Automated Penetration Testing; Can IT Afford Not To?
sponsored by Core Security Technologies
WHITE PAPER:
This paper contains an overview of penetration testing, a summary of vulnerabilities that can be revealed through penetration testing, and the business and technical benefits of performing penetration testing across your infrastructure.
Posted: 18 Jan 2007 | Published: 01 Jan 2007
|
|
|
Enterprise-Grade Wireless LAN Security
sponsored by Siemens
WHITE PAPER:
This white paper outlines the considerations that should be taken into account to ensure a successful enterprise-wide deployment of a secure wireless network.
Posted: 14 Nov 2006 | Published: 01 Sep 2005
|
|