TITLE

WATCHGUARD DEPLOYS INTEGRATION OF NETWORK SECURITY

PUB. DATE
June 2014
SOURCE
Computer Security Update;Jun2014, Vol. 15 Issue 6, p6
SOURCE TYPE
Periodical
DOC. TYPE
Product Review
ABSTRACT
The article offers brief information on the Unified Threat Management (UTM) and Next-Generation Firewall (NGFW) computer programs from Watchguard Technologies Inc.
ACCESSION #
96567092

 

Related Articles

  • Firebox II heats up security. Kerstetter, Jim // PC Week;05/04/98, Vol. 15 Issue 18, p40 

    Looks at Firebox II, the second version of WatchGuard Technologies Inc.'s all-in-one computer network security product. The addition of an Internet Protocol (IP) Security (IPSec)-compliant virtual private network (VPN) capability; Other features; Centralized management; Pricing; Contact...

  • No-sweat network security. Phillips, Ken // PC Week;09/13/99, Vol. 16 Issue 37, p98 

    Evaluates WatchGuard LiveSecurity System 4.0 software, WatchGuard Technology Inc.'s firewall/VPN appliance. Security of Internet-attached networks and remote user connections; Features; Price. INSETS: Labs'-eye view: Pankaj Chowdhry.;Business sense..

  • WATCHGUARD WI-FI CLOUD CONNECTS AND PROTECTS SMBS.  // Computer Security Update;Nov2016, Vol. 17 Issue 11, p6 

    The article discusses launch of WatchGuard Wi-Fi Cloud, a Wireless Internet (Wi-Fi) management platform from WatchGuard Technologies.

  • WatchGuard Goes Virtual with Network Security.  // Computer Security Update;Jun2012, Vol. 13 Issue 6, p1 

    The article offers information on WatchGuard XTMv virtualized extensible threat management computer software series and WatchGuard XCSv extensible content, DLP, Web and Email Security from WatchGuard Technologies Inc.

  • Daemons defy hackers. Surkan, Michael // PC Week;2/5/96, Vol. 13 Issue 5, pN1 

    Compares the TCP/IP-network security auditing tools Internet Scanner 3.2, NetProbe 1.2, Pingware 2.0.1 and SATAN (Security Administrator Tool for Analyzing Networks) 1.1.1. Source porting; Source routing; Connectionless protocols; Firewall vulnerabilities; Internal vulnerabilities. INSETS:...

  • Firewall defense gets more sophisticated. Nelson, Matthew; Fitzloff, Emily // InfoWorld;01/12/98, Vol. 20 Issue 2, p6 

    Describes some of the computer network security software that are slated for rollout at the RSA Data Security Conference in San Francisco, California in January 1998. International Business Machines' (IBM) open beta version of Firewall 3.1 for Windows NT; Version 1.5 of IBM's Global Sign-On...

  • Buyer's guide. Walters, Kevin // PC Week;10/13/97, Vol. 14 Issue 43, p152 

    Presents a chart of network security auditing tools available for October 1997. Network operating systems supported; Means for network security scanning; Alarms for security weakness; Company and product names; Price information and customer support.

  • Beating back the hackers. Kates, Jim // Network World;10/27/97, Vol. 14 Issue 43, p1 

    Evaluates five software products that search for security loopholes in computer networks. Approaches taken by each software to find vulnerabilities in the network; Shareware products; Axent's OmniGuard/ESM; internet Scanner; Stalker; Asmodeus.

  • Ask Dr. Internet. Blass, Steve // Network World;12/3/2001, Vol. 18 Issue 49, p35 

    Features the computer peripheral Firebox from WatchGuard Technologies Inc. Advantages of the product; Inclusion of VPN supporting Point-to-Point Tunneling Protocol or Internet Protocol (IP) Security; Use of static IP address to solve the connection problem.

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics