Application firewall

Results: 701



#Item
161Computing / Managed security service / Application firewall / Network security / Unified threat management / Security / MSS / AhnLab Inc / SecureWorks / Computer network security / Computer security / Cyberwarfare

Latest News NWT Launches “Managed Security Services” to Protect Enterprises from Network Threats (1 December 2009, Hong Kong) The Hong Kong Computer Emergency Response Team Coordination Centre received 532 computer a

Add to Reading List

Source URL: www.newworldtel.com

Language: English - Date: 2009-12-30 02:22:57
162Software / OwnCloud / Application firewall / Fail2ban / Transport Layer Security / Firewall / Secure Shell / Computer network security / System software / Computing

Optimizing ownCloud Security Tips & tricks for the security conscientious A recent study by Harris Interactive found that 38% of those surveyed admitted to using a file sharing solution that is not approved by IT leaving

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2015-03-09 11:39:53
163Relational database management systems / Microsoft SQL Server / Windows / Firefox / ASP.NET / Application server / Microsoft SharePoint / Software / Computing / Windows Server

MarketSight Technical Datasheet MarketSight® is an enterprise data analysis and reporting platform that is available in a hosted environment or as an on premise installation (behind a corporate firewall). Both of these

Add to Reading List

Source URL: www.marketsight.com

Language: English - Date: 2014-07-22 16:36:22
164Computer security / Application firewall / Information security / Software as a service / Cloud communications / IICCRD / Centralized computing / Cloud computing / Computing

Security of Cloud Computing Providers Study Sponsored by CA Technologies Independently conducted by Ponemon Institute LLC Publication Date: April 2011

Add to Reading List

Source URL: www.ca.com

Language: English - Date: 2013-04-24 12:29:05
165Firewall / Stateful firewall / Distributed firewall / OpenFlow / Application firewall / Comparison of firewalls / Computer network security / Cyberwarfare / Computing

Towards a Reliable SDN Firewall Hongxin Hu† , Gail-Joon Ahn‡ , Wonkyu Han‡ and Ziming Zhao‡ † ‡ Delaware State University, Arizona State University

Add to Reading List

Source URL: www.public.asu.edu

Language: English - Date: 2014-04-08 03:25:30
166Security / Software testing / Hacking / Zero-day attack / Vulnerability / Cross-site scripting / Application firewall / Exploit / Malware / Computer security / Cyberwarfare / Computer network security

A TRENDLABS SECURITY ADVISORY ON THE RECENT ATTACK AGAINST WEB APPLICATION VULNERABILITIES Conducting Business on the Web

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2014-10-06 22:54:01
167Cyberwarfare / Computer worms / Application firewall / Computer security / ModSecurity / Robert Tappan Morris / Morris worm / Firewall / Computer network security / System software / Security

Stop complaining and solve a security problem instead Stop complaining and… Solve a Security Problem Instead

Add to Reading List

Source URL: blog.ivanristic.com

Language: English - Date: 2013-02-15 05:44:27
168McAfee / Companies listed on the New York Stock Exchange / Firewall / Cyberwarfare / Comparison of firewalls / Application firewall / Computer network security / Computer security / Computing

Microsoft Word - 61885brf_ngfw-hc_0315_fnl.docx

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-03-30 15:31:45
169Computing / Application firewall / Denial-of-service attack / Intrusion prevention system / Vulnerability / Payment Card Industry Data Security Standard / Computer network security / Cyberwarfare / Computer security

SPECIAL CONDITIONS – SECURITY SERVICES 1. Application 1.1

Add to Reading List

Source URL: go.melbourneitenterprise.com.au

Language: English - Date: 2015-05-03 01:14:42
170Computing / Hacking / Software testing / Vulnerability / Operating system / Firewall / Windows / Network security / Application firewall / Computer security / Cyberwarfare / Computer network security

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:18
UPDATE