A short introduction on how to benefit from daily operations automated. With Policy Manager 10, centralized security management is easier than ever! Click play and witness it yourself! Find out more about Policy Manager 10 at www.f-secure.com/policymanager
Astaro Awarded 5 Stars by SC Magazine for Web Content Filtering
Astaro was recognized with a 5 star review by SC Magazine for our web content filtering technology. The full review can be read here: Web Content Management . What is most impressive about the review isn’t the spectacular comments regarding the technology it is what they have listed as the negative: nothing.
A10 Quick Classes (#2): The Modes of Server Load Balancing
See all the A10 Quick Classes at www.a10networks.com We will teach you about the four Modes of Server Load Balancing: Routed Mode, One-Arm Mode, Transparent Mode and Direct Server Return (DSR) Mode. When adding the AX Series into your infrastructure, the AX platform offers several key benefits. By deploying an AX Series you can maximize application availability, scalability, and performance.
Security-Anforderungen klar erfüllt
Stephanus-Stiftung erweitert Unternehmenskommunikation und spart gleichzeitig Kosten Welches Unternehmen sieht sich heute nicht zwischen der Anforderung für mehr Sicherheit und verbesserter Kommunikation bei gleichzeitiger Kosteneinsparung. Der Stephanus-Stiftung Berlin-Brandenburg ist dies mit dem Einsatz von XTM Appliances gelungen.
Fortinet – A History of Innovation
As Fortinet continues to celebrate its 10 Year Anniversary, Ken Xie details the company’s history, growth and innovation, while employees discuss their company experiences.
Fortinet – Dictate the Decade
Fortinet celebrates 10 years of innovation and thought leadership in the computer security industry.
Botnets Part 1
See actual malicious code and understand how it works. Corey Nachreiner explains botnet architecture for beginners, then builds a bot client.
IT security theses on a high-quality level during the CAST event
Last Thursday I visited an event of the “Competence Center for Applied Security Technology for IT security” (CAST) in Darmstadt, where CAST awarded the best IT security final paper of bachelor, diploma and other qualified students in Germany, Switzerland and Austria.
Rootkits Part Three
Topics chosen by user vote. Kernel mode rootkits; leading techniques and tools for detecting rootkits; how your Firebox helps stop rootkits from entering your network.
Bud Has Mail
Bud’s latest misadventure teaches him what can go wrong when he clicks on a malicious email. Even non-technical users can learn from Bud how to handle email more safely