Secure Computing Whitepapers


Sort by: Date | Company | Title


Dude! You Say I Need an Application-Layer Firewall?!
By Secure Computing | 30/7/2008

Proxy firewall technologies have proven time and again to be more secure than “stateful” firewalls. They will also prove to be more secure than “deep inspection” firewalls. High-performance proxy firewalls are available today which are easily capable of handling gigabit-level traffic. Discover more by reading on.

Download this now


Did you GET the memo? Getting you from Web 1.0 to Web 2.0 Security
By Secure Computing | 30/7/2008

Enterprises have forged ahead with the rapid evolution from Web 1.0 to Web 2.0 without addressing the inherent security risks. It is imperative for organisations to continue to embrace new technologies to survive, but security must shift from being an after thought to a primary consideration. Read on to find out more.

Download this now


Still Sneaking In: The Threats Your Security Tools Aren't Telling You About
By Secure Computing | 30/7/2008

Web 2.0 applications are all the rage, offering us tremendous value when it comes to collaboration and communication. They also open us up to new kinds of attacks however, and can cause problems in keeping systems and data secure. Read on to learn about the new attack methods and how you can defend yourself and your business.

Download this now


Radicati Market Quadrant 2008 on Corporate Web Security
By Secure Computing | 30/7/2008

An Analysis of the Market for Corporate Web Security Solutions, revealing Top Players, Mature Players, Specialists and Trail Blazers. Read on to discover who makes the grade.

Download this now