For more information on how to get your content listed on the IThound network,
>>click here
- Winning the Battle Against False Positives
- by Stonesoft
-
Type: White Paper
Published: December 2006This white paper describes a solution to these problems. It introduces StoneGate Platform that combines StoneGate Firewall, StoneGate VPN, and StoneGate IPS-Intrusion Detection and Analysis
for Active Response, under a common, centralized management system.
- StoneGate: Balancing Security and Business Continuity
- by Stonesoft
-
Type: White Paper
Published: December 2006This paper surveys the network confidence issues facing IT managers, and provides an overview of StoneGate™, the combined firewall security and network availability solution from Stonesoft
Corporation.
- The Secret to Simplified Firewall and VPN Security
- by Stonesoft
-
Type: White Paper
Published: December 2006In this white paper, we examine some of the issues surrounding the dilemma of managing these increasingly complex network systems with fewer and fewer resources.
- Multi-Layer Inspection
- by Stonesoft
-
Type: White Paper
Published: December 2006Stonesoft’s StoneGate™ High Availability Firewall and VPN solution introduces an advanced, hybrid technology for firewalls. Customers wishing to securely connect corporate networks to the Internet, or reinforce security between corporate LANs, now have an even better choice of firewall technologies.
- Enterprise Availability for Mid-Size Businesses - Managing In-Depth Network Security and Availability
- by Stonesoft
-
Type: White Paper
Published: January 2008This paper addresses the challenges facing mid-sized enterprises in managing both security and network continuity, and how an integrated approach can save in both communication and operational costs.
- A Checklist for Implementing a True Centralized Management Strategy
- by Stonesoft
-
Type: White Paper
Published: April 2008The purpose of this paper is to assist business and IT leaders in determining the right network management strategy and architecture for their organization and to provide practical advice on how to implement the best strategy to drive tangible business value.
- Sophos Threat Report Update: July 2008 - Malware, Security, Email and Web Threat Trends
- by Sophos
-
Type: White Paper
Published: July 2008This report gives a comprehensive insight into the events and trends that emerged during the first half of 2008, and helps businesses to stay ahead of today’s increasingly covert threats.
- Network Access Control - A software solution for endpoint assessment and control
- by Sophos
-
Type: Software Product
Sophos NAC Advanced is a software-based solution for endpoint assessment and control offering the most comprehensive and easy-to-deploy solution available. Sophos gives you the ability to control who and what is connecting to your network.
- Email Security and Control - Complete defence against spam, phishing, malware and data leakage
- by Sophos
-
Type: Hardware Product
Sophos Email Security and Control proactively blocks inbound and outbound threats with unrivaled effectiveness and simplicity, delivering high-capacity, high-availability gateway and groupware security.
- Vulnerability Management for Dummies - eBook
- by Qualys Technology
-
Type: White Paper
Published: April 2008Vulnerability Management for Dummies arms you with the facts and shows you how to implement a successful Vulnerability Management program. Whether your network consists of just a handful of computers or thousands of servers distributed around the world, this 5-part book will give you all the facts.
- Free Scan for Security Risks: Endpoint Assessment Test
- by Sophos
-
Type: Demo
Published: July 2008Is your computer putting your organization's security at risk?
The Endpoint Assessment Test is a free tool that scans a computer and assesses whether it is a security risk to your organization.
- Stopping Data Leakage: Exploiting your existing security investment
- by Sophos
-
Type: White Paper
Published: June 2008This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint, and describes where new investment should realistically be made.
- Safe and Productive Browsing in a Dangerous Web World: The challenge for business
- by Sophos
-
Type: White Paper
Published: February 2008This paper highlights the six top tricks used by hackers and describes the three pillars of protection organizations need to safeguard their systems and resources.
- Case Study - The European Patent Office streamlines Vulnerability Management to ensure the confidentiality, integrity and availability of it patent information
- by Qualys Technology
-
Type: Case Study
Published: April 2008As the European Patent Office grew increasingly reliant on its IT infrastructure to transform how it accepts and manages patent applications, the security risks of its infrastructure grew, too. So the EPO sought a more effective way to automate its vulnerability management processes.
- NAC at the Endpoint: control your network through device compliance
- by Sophos
-
Type: White Paper
Published: May 2008This paper discusses why NAC is important and how it should be implemented on the endpoint for maximum protection.
- Case Study - Sodexo strengthens the reliability of its information systems with QualysGuard
- by Qualys Technology
-
Type: Case Study
Published: April 2008The Sodexo Group wanted to improve its knowledge and management of vulnerabilities for all its distributed Information Systems, located throughout the world in highly decentralised subsidiaries. They selected QualysGuard to help them do this.
- Effective Web Policies: Ensuring staff productivity and legal compliance
- by Sophos
-
Type: White Paper
Published: April 2008This paper discusses how to create a policy that balances an organization’s need for protection against an individual’s expectations.
- Defending the Email Infrastructure: Why email requires comprehensive protection
- by Sophos
-
Type: White Paper
Published: April 2008This paper explores the threats facing email infrastructures, illustrating the need for multi-layered security.
- QualysGuard Enterprise
- by Qualys Technology
-
Type: Service
QualysGuard Enterprise enables organizations to reduce risk and manage compliance processes by providing security risk and policy compliance management in one solution.
- QualysGuard Express
- by Qualys Technology
-
Type: Service
QualysGuard Express is an on demand solution, fully automated to identify security vulnerabilities, track remediation and ensure regulatory compliance. Driven by the most comprehensive vulnerability KnowledgeBase in the industry, QualysGuard delivers proactive network protection