Firewalls Resources

Firewalls news and support resources, featuring the hottest solutions, technologies and vendors in the Firewalls world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Firewalls"

IGEL Community Releases Free “How-To Install and Configure the IGEL Software Platform” Made Easy Book

IGEL Technology
0
“Life is really simple, but we insist on making it complicated.” -Confucius I’m thrilled and proud to introduce you to the first version of the ‘IGEL Software Platform: Step-by-Step Getting Started Guide.‘  A free book, written by the IGEL Community, on how to install and configure the IGEL software stack, all screen-shot by screen-shot. Simply […]

4 Types of Security Tools that Everyone Should be Using

Devolutions
0
We all know that data breaches are on the rise. Which means that most people are increasing their cyber security IQ, right? Unfortunately, that’s not the case! According to a survey by Pew Research Center, the majority of people are still unclear about some critically important cyber security topics, terms and concepts. To help bridge […]

Citrix XenMobile + Microsoft Intune Integration Offers Security, Flexibility and a GREAT user experience

Citrix Systems
0
XenMobile offers transparent, highly secure micro-VPN connectivity behind the corporate firewall. Intune provides application layer data protection for Office 365 mobile apps without affecting end user experiences. Today, customers no longer have to choose between the two. XenMobile adds value for Office 365 XenMobile is the first unified endpoint management (UEM) solution to integrate with […]

Tricerat Print Server Proxy: What’s new in the 6.6.0

Tricerat
0
With the release of 6.6.0, Tricerat added functionality to help its customers print in a variety of situations. One of our newest features is the Print Server Proxy function, geared toward helping users print with print servers. Why We Added It One of the requirements to use Tricerat’s software with print servers is that firewall […]

Create SSMS shortcuts with Remote Desktop Manager

Devolutions
0
Remote Desktop Manager (RDM) is far more capable than its name might first suggest. As well as using it at work to manage all of our endpoints, my department has it managing passwords, online resources, firewalls and switches across multiple domains. This is made possible by RDM’s robust credential management and wide variety of entry types. […]

VMware: Routing Deep Dive on VMware’s NSX-T (Distributed Routing and Centralized Routing)

VMware
0
In the first part of this blog series, NSX-T: Routing where you need it (Part 1), I discussed how East-West (E-W) routing is completely distributed on NSX-T and how routing is done by the Distributed Router (DR) running as a kernel module in each hypervisor. In this post, I will explain how North-South (N-S) routing […]

NAKIVO Helps a Hosting Provider Save €25,000 in Backup Cost

NAKIVO
0
Phi Medien Systeme GmbH, a hosting and cloud services provider, headquartered in Jülich, Germany, is using NAKIVO Backup & Replication to back up and near-instantly recover VMware VMs with Flash VM Boot, while also saving €25,000 in backup costs. NAKIVO Inc., a fast-growing software company for protecting virtualized and cloud environments, has announced today that […]

Microsoft: Better Together to Manage and Secure Macs

Microsoft
0
At the Jamf Nation User Conference (JNUC) in October, we talked about how our partnership would provide an automated compliance-based solution for secure access to corporate data from Mac devices. This solution uses Microsoft Enterprise Mobility + Security (EMS) conditional access and Jamf Pro Mac management capabilities to ensure that company data can only be […]

Cisco: Why Apigee is Awesome

Cisco
0
When we announced the joint hybrid cloud partnership Cisco has developed with Google, Kip Compton revealed the pieces of the solution with this high level diagram: Between now and GA, I’ll be discussing some details on the individual components of the solution that make up the combined whole, starting with a Google component you may […]

Citrix: 3 Steps & 5 Minutes Can Stop a Top Security Risk in Your Organisation

Citrix Systems
0
The fact that human error is the biggest security risk to any organisation should not be news to anyone. However, the notion that a harmless, daily routine for most users is one of the top security risks organisations face today might come as a surprise. Internet browsing — the most common break activity of the […]

AWS reInvent Highlights – NeuVector

NeuVector
0
This was my first time attending AWS re:Invent. NeuVector was also a sponsor and our team was here to meet with customers and discuss their use cases. Although Microsoft Azure and Google Cloud are rising rapidly, the vast user base of AWS and countless new features and improvements introduced every week make AWS the dominant […]

deviceTRUST – Use Case (Conditional Access based on Security State) Video

deviceTRUST
0
In this use case video, we show how the security state of the security components on the endpoint (firewall, anti-spyware, anti-virus, Windows updates, etc.) control access to the remote session. This video is from the fine folks at deviceTRUST.

Microsoft showcases latest industrial IoT innovations at SPS 2017

Microsoft
0
We are excited to extend our lead in standards-based Industrie 4.0 cloud solutions using the industrial interoperability standard OPC UA, with several new product announcements at SPS IPC Drives 2017 in Nuernberg, Europe’s leading industrial automation exhibition, which takes place next week. We continue to be the only cloud provider that offers both OPC UA […]

Secure your Citrix NetScaler GSLB configuration

Anton van Pelt
0
Recently I was working on a couple of NetScaler Global Server Load Balancing (GSLB) configurations. One of these customers put NetScaler on the edge of the network. Although I always recommend to put NetScaler behind a firewall, this customer had a good reason to not follow my advise, simply because the workload is to heavy […]

Visit Our Sponsors

Close