UTM Reports

7 risk mitigation strategies to protect business operations
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Risk mitigation strategies must not only identify risks and threats, but also stress the importance of identifying vulnerabilities that could open the door to risk events. In this infographic, we put together the seven most widely used risk mitigation strategies with to help business keep their data safe.
Posted: 13 Oct 2022 | Published: 13 Oct 2022

TechTarget ComputerWeekly.com

Botnets: The dark side of cloud computing
sponsored by Sophos
WHITE PAPER: Botnets pose a serious threat to your network and they rival the power of today’s most powerful cloud computing platforms. These “dark” clouds, controlled by cybercriminals, are designed to silently infect your network. This paper details how to protect against the risk of botnet infection with security gateways that offer comprehensive UTM.
Posted: 06 Apr 2012 | Published: 05 Apr 2012

Sophos

Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed
sponsored by Shavlik Technologies
ANALYST NEWS: This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.
Posted: 20 Jul 2009 | Published: 20 May 2009

Shavlik Technologies

Security-In-Depth Using Integrated Risk-Conscious Controls
sponsored by Tripwire, Inc.
WHITE PAPER: Most organizations seem stuck in the traditional castle-and-moat approach to security. This approach assumes there's a clear boundary between what's inside and outside the organization and that attacks come from external sources. Clearly today's threat environment requires a new approach.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Tripwire, Inc.

An Integrated Approach to Managing Application Security
sponsored by IBM
WHITE PAPER: This white paper will discuss the major challenges organizations face when protecting apps from today's threats and examines solutions you can leverage to enable risk-based app security.
Posted: 05 Mar 2014 | Published: 31 Oct 2013

IBM

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

Practical Advantages of Fireware® XTM for Hands-On IT Administrators
sponsored by WatchGuard Technologies, Inc.
WHITE PAPER: Take a look at the new XTM (extensible threat management) network security from WatchGuard. See the tangible benefits this new generation of security solutions offers. No hype -- just concrete examples of XTM features and the advantages they deliver for you to evaluate against your current security.
Posted: 26 Oct 2009 | Published: 26 Jul 2009

WatchGuard Technologies, Inc.

Managing Security Risks and Vulnerabilities
sponsored by IBM
WHITE PAPER: Read now to learn about automated labor-saving automation, a platform that incorporates vulnerability analysis, risk management, and remediation support, all within a single console.
Posted: 06 Mar 2014 | Published: 31 Jan 2014

IBM

Unified Threat Management: The Best Defense against Blended Threats
sponsored by SonicWALL
WHITE PAPER: The SonicWALL® Unified Threat Management solution (UTM) provides the most intelligent, real-time network protection against sophisticated application-layer and content-based attacks.
Posted: 28 Apr 2008 | Published: 01 Jan 2005

SonicWALL

A Guide to Utilizing Virtualization in a Disaster Recovery Strategy
sponsored by Dell EMC and Microsoft
EGUIDE: In this expert E-Guide, brought to you by SearchServerVirtualization.com and Dell, you will discover the steps essential for effectively integrating server virtualization into your disaster recovery strategy.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Dell EMC and Microsoft