Drew Robb - Article Archives - Page 1

2018 IT Security Outlook: Attacks and Threats Get More Sophisticated

January 4, 2018
2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.
READ MORE

Ten Top Next-Generation Firewall (NGFW) Vendors

November 21, 2017
Next-generation firewalls are essential to IT security. We review ten of the best.
READ MORE

Check Point Advanced Threat Protection: NGFW Overview and Analysis

November 21, 2017
We review Check Point's next-generation firewall, which offers protection across the cloud, enterprise networks and mobile devices.
READ MORE

Huawei USG: Next-Gen Firewall Overview and Analysis

November 21, 2017
We review Huawei USG, a next-gen firewall that offers application access control, policy automation and threat prevention.
READ MORE

Cisco Firepower NGFW: Firewall Overview and Analysis

November 21, 2017
We review Cisco Firepower NGFW, an integrated next-gen firewall that works with a broad set of security services.
READ MORE

Palo Alto Networks PA Series: Next-Gen Firewall Overview and Analysis

November 21, 2017
We review Palo Alto Networks' next-gen firewalls, which classify all traffic based on application, application function, user and content.
READ MORE

SonicWall SuperMassive: Next-Gen Firewall Overview and Analysis

November 21, 2017
We review SonicWall's next-generation firewalls, which serve everything from small businesses to large enterprises.
READ MORE

Forcepoint NGFW: Firewall Overview and Analysis

November 21, 2017
We review Forcepoint NGFW, which lets security teams deploy, monitor, and update thousands of firewalls, VPNs and IPSs through a single console.
READ MORE

Fortinet FortiGate: Next-Gen Firewall Overview and Analysis

November 21, 2017
We review Fortinet FortiGate, a top next-generation firewall built for carriers and distributed enterprises.
READ MORE

Juniper Networks SRX: Next-Gen Firewall Overview and Analysis

November 21, 2017
We review Juniper Network's next-gen firewall, which adapts to new threats and supports up to 100 million concurrent user sessions.
READ MORE

Barracuda F-Series: Firewall Overview and Analysis

November 21, 2017
We review Barracuda F-Series next-gen firewalls, which protect the network at headquarters, in the cloud and on every WAN endpoint.
READ MORE

Sophos XG Firewall: Overview and Analysis

November 21, 2017
We review Sophos XG Firewall, a next-generation firewall that automatically isolates and blocks threats.
READ MORE

Deceiving the Deceivers: Deception Technology Emerges as an IT Security Defense Strategy

September 6, 2017
Deception technology is becoming a critical IT security defense strategy. We outline how deception tools work and the vendors to watch.
READ MORE

Top 10 Enterprise Encryption Products

August 15, 2017
Encryption remains a mainstay of IT security technology, a critical tool for protecting sensitive data. We evaluate the top encryption solutions.
READ MORE

IBM Guardium Data Encryption: Product Overview and Analysis

August 15, 2017
We review IBM Guardium Data, which performs encryption and decryption with minimal performance hit and requires no changes to databases, apps or networks.
READ MORE

Eset DESlock: Encryption Product Overview and Analysis

August 15, 2017
We review Eset DESlock, an enterprise encryption tool that allows remote device wipe and control and ease of management and use.
READ MORE

Dell Encryption Enterprise: Product Overview and Analysis

August 15, 2017
We review Dell Encryption Enterprise, which offers encryption that protects all data types regardless of device, operating system or location.
READ MORE

McAfee Complete Data Protection: Encryption Product Overview and Analysis

August 15, 2017
We review McAfee Complete Data Protection, which offers encryption as part of a suite that includes DLP, device control, and protection for cloud storage.
READ MORE

HPE SecureData: Encryption Product Overview and Analysis

August 15, 2017
We review HPE SecureData, an enterprise security solution that offers end-to-end data protection, securing data at rest, in motion and in use.
READ MORE