Firewall Whitepapers


Sort by: Date | Company | Title


Unified Access
By Alcatel-Lucent | 7/11/2013
Jump the wall between the wired network and the wireless one.
Download this now


How Threat Actors Steal Your Data
By Trend Micro Australia | 23/9/2013
Advanced Persistent Threats strive to remain undetected in the network in order to gain access to the valuable data. Once in, it can be an arduous task for system administrators to detect any malicious activity in the network. In this whitepaper, we look at the methods used for malicious activity and what efforts can be taken to mitigate the problem.
Download this now


Targeted Attack Campaigns
By Trend Micro Australia | 23/9/2013
Advanced Persistent Threats (APTs) refer to a category of threats that aggressively pursue and chosen targets that over time attempt to get deeper into their network. For Enterprises, this is a high priority threat as human and systemic weaknesses can be mitigated with correct practices and solutions. In this report we look at targeted attack campaigns and how these can be mitigated.
Download this now


New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection (Sponsored by McAfee)
By McAfee Australia | 18/3/2013
The latest version of the flagship McAfee® Gateway Anti-Malware technology adapts to new threats and plans for future threats with a modular design that allows for the easy addition of components for maximum flexibility for future malicious exploit trends.
Download this now


Modernizing Security for the Small and Mid-Sized Business – Recommendations for 2013 (Sponsored by McAfee)
By McAfee Australia | 18/3/2013
As small and mid-sized businesses (SMBs) take advantage of the compelling benefits of the transformations in their IT computing infrastructure they should also re-think how they deal with the corresponding vulnerabilities, threats and risks. Specifically, email security, web security and secure file sharing should be considered foundational security capabilities for every small and mid-sized business, in addition to anti-virus and firewalls.
Download this now


Reference Architectures for Virtualisation
By Symantec | 14/3/2013
Organisations strive for leverage to drive down costs, improve business agility and benefit from increased automation and efficiency. In order to deliver performance, organisations compete on how best to remove the barriers of virtualisation and migrate their applications, while managing the associated complexity and risk. Read more to find how a focus of reference architecture delivers your goals.
Download this now


Controlling Peer-to-Peer and Recreational Internet Traffic
By Exinda | 26/11/2012
This paper will discuss strategies for controlling a broad range of recreational Internet traffic such as instant messaging, P2P file downloads and social networking activities that can significantly slow business applications and impact employee productivity. By implementing a solution to effectively detect, classify and control recreational traffic, including encrypted P2P traffic designed to slip past corporate firewalls, organisations can improve employee productivity, accelerate application response times, reclaim bandwidth for business-critical applications and defer costly bandwidth upgrades. Read this whitepaper.
Download this now


Endpoint Buyers Guide
By Sophos | 11/4/2012
In this Endpoint Buyers Guide, we examine the top vendors according to market share and industry analysis: Kaspersky Lab, McAfee, Sophos, Symantec and Trend Micro. Each vendor’s solutions are evaluated according to: Product features and capabilities, Effectiveness, Performance, Usability, Data protection and Technical support.
Download this now


Rob Clyde Consulting Report: Beyond the Wall: Security in a Post-Perimeter World
By Webroot | 6/3/2012
Walls have served multiple purposes throughout history. The Great Wall of China defended against invaders, while the Berlin Wall kept citizens from freely traveling beyond the control of their rulers. Network security relies on similar premises. For years network security professionals touted “perimeter security” as the primary solution to keep the bad guys out and the good guys in. However, just as guns and air attacks overcame protective walls, changes in malware attacks have rendered network firewalls and perimeter-centric security an ineffective defense.
Download this now


10 Things Your Next Firewall Must Do
By Palo Alto Networks | 24/1/2012
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprisefocused, and distinct, many network security vendors are claiming NGFW is a subset of other functions (e.g. UTM or IPS). Most traditional network security vendors are attempting to provide application visibility and control by using a limited number of application signatures supported in their IPS or other external database. But underneath, these capabilities are poorly integrated and their products are still based on legacy port-blocking technology, not NGFW technology. Read on.
Download this now

Most Popular Reviews

Follow Us

Best Deals on GoodGearGuide

Shopping.com

Latest News Articles

Resources

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?