When a giant global plastics manufacturer faced a super cyber threat landscape, SonicWall’s firewall “Hero Sandwich” came to the rescue. This powerful security solution of the SonicWall Firewall Sandwich was recently leveraged by our customer, a global enterprise network. The challenges faced by this customer were the same that all companies face today as the cyber threat landscape increases exponentially year over year.
FacebookTwitterGoogle+LinkedIn
The foundation of email threat protection has long been anti-virus technology and IP reputation databases. Threat research teams across the globe are hard at work analyzing email, identifying spam and malware, and building anti-virus and IP reputation database libraries to help combat threats. Experts agree that for best threat protection, email security solutions should not rely on a single anti-virus engine or reputation database, but should integrate multiple sources to maximize security effectiveness.
FacebookTwitterGoogle+LinkedIn
If you follow sports at all you’ve probably heard about athletes using visualization to improve performance. It’s a simple tool where an athlete visualizes or “sees” himself or herself performing successfully in the athlete’s mind. Through visualization athletes paint a mental picture of how they will succeed and accomplish their goals.
FacebookTwitterGoogle+LinkedIn
SonicWall World 2015 takes place in Austin in a couple of weeks, Oct. 20-22, and I am eager to talk security with our customers, partners, press and analysts. We will kick off the conference with a Network Security Track at the SonicWall World Software User Forum, which leads to three information-packed days of technical training for SonicWall Next-Generation Firewall customers.
FacebookTwitterGoogle+LinkedIn
As an IT leader, you understand how new disruptive technologies can improve your company’s competitive positioning and drive overall business value. Technology trends such as cloud, mobility, social and big data compel companies to move quickly to define and implement next-generation data center architectures and security defense strategies to take advantage of these new technologies.
FacebookTwitterGoogle+LinkedIn
A lot has happened in the last year across SonicWall Network Security Solutions. We have implemented a complete refresh of our SonicWall TZ Wireless firewall product line from top to bottom while expanding the portfolio with the introduction of new platform form factors and performance capabilities. We’ve innovated the software as well, improving features and performance, to deliver value for every size company from small businesses to distributed enterprises.
FacebookTwitterGoogle+LinkedIn
This week, I was excited to attend the SonicWall Peak Performance Conference and get an opportunity to speak with our partners about what they’re seeing in the field and how we can help them build their business. SonicWall’s leadership in security is due to our VARs, who are critical to helping customers keep their organizations safe.
FacebookTwitterGoogle+LinkedIn
Today, at SoincWall Peak Performance 2015 in Las Vegas, I am zeroing in on the most important information for our SoincWall Security channel partners. A lot has happened in the last year across SoincWall Security Solutions. In fact, as of this month, we have quite literally completed a complete refresh of our SonicWall TZ Wireless firewall product line from top to bottom while expanding the portfolio with the introduction of new platform form factors and performance capabilities.
FacebookTwitterGoogle+LinkedIn
As advances in networking continue to provide tremendous benefits, businesses are increasingly challenged by sophisticated attacks designed to disrupt communication, degrade performance and compromise data. Striking the perfect balance between network security and performance is no easy task. Meeting these demands can be especially daunting for small businesses, which usually cannot afford the same degree of protections as their larger counterparts.
FacebookTwitterGoogle+LinkedIn
Lock fading into cyber security space
I returned to Las Vegas earlier this month to attend the Black Hat USA 2015 hacker conference where I learned about the latest and most shocking vulnerabilities discovered by security researchers from around the world. It’s fascinating to see some of the incredible security exploits being demonstrated there which I thought were possible only in sci-fi films.
FacebookTwitterGoogle+LinkedIn