SonicWALL Security Products | Partners | Contact Sales 1-800-509-1265
Search

 •   • 

Resources

Filter By:
Solution
Language
Category:

Case Studies

 of 102 more items  |  all items only  items + show summaries - hide summaries

  • view pdf
    U.S. Cellular

    U.S. Cellular increases availability, capacity, scalability and security with Dell SonicWALL SuperMassive firewalls.

    18 Jul 2014 / PDF: 0.260 MB / CS-317
  • view pdf
    Promise Healthcare

    Promise Healthcare speeds access to medical applications with 35 percent faster
    network performance.

    5 May 2014 / PDF: 0.420 MB / CS-316
  • view pdf
    Massage Envy

    Massage Envy reduces complexity and strengthens security at over 960 locations with Dell SonicWALL next-gen firewalls.

    7 Apr 2014 / PDF: 0.500 MB / CS-315
  • view pdf
    Park City Mountain Resort

    Park City Mountain Resort ensures ski resort operations are safe and secure with Dell SonicWALL next-gen firewalls. Customer achieves PCI compliance and VDI from Dell Networking, Storage, Services and Wyse solutions.

    24 Feb 2014 / PDF: 0.980 MB / CS-314
  • view pdf
    eResearch South Australia

    eResearch South Australia, a university joint venture, created an open-source cloud and high-performance computing
    infrastructure based on SuperMassive 9600 firewalls, PowerEdge servers and a Networking Active Fabric solution from Dell.

    27 Jan 2014 / PDF: 1.510 MB / CS-313
  • view pdf
    Church of the Highlands

    Mega-church handles massive number of connections on Sunday mornings from 26,000 people across 10 campuses with Dell SonicWALL SuperMassive, NSA and TZ Series firewalls.

    14 Jan 2014 / PDF: 0.540 MB / CS-312
  • view pdf
    1-Stop Connections

    Freight and logistics IT company improved employee productivity and eliminated VPN-related help desk calls by 100 percent with Dell SonicWALL SuperMassive next-gen firewalls.

    25 Nov 2013 / PDF: 0.760 MB / CS-310
  • view pdf
    AU - 1-Stop Connections

    Freight and logistics IT company improved employee productivity and eliminated VPN-related help desk calls by 100 percent with Dell SonicWALL SuperMassive next-gen firewalls.

    25 Nov 2013 / PDF: 0.760 MB / CS-311

 of 102 more items  |  all items only  items + show summaries - hide summaries

Data Sheets

 of 90 more items  |  all items only  items + show summaries - hide summaries

  • view pdf
    Mobile Connect

    With the SonicWALL™ Mobile Connect™ application, in combination with Dell SonicWALL Secure Remote Access (SRA) or next-generation firewall appliances, you can give your employees safe, easy access to the data and resources they need to be productive from a range of devices, including iOS, OS X, Android™,
    Kindle Fire and Windows 8.1,, while ensuring that the corporate network is protected from mobile security threats.

    25 Jun 2014 / PDF: 2.220 MB / DS-371
  • view pdf
    SonicWALL Mobile Connect

    With the SonicWALL™ Mobile Connect™ application, in combination with Dell SonicWALL Secure Remote Access (SRA) or next-generation firewall appliances, you can give your employees safe, easy access to the data and resources they need to be productive from a range of devices, including iOS, OS X, Android™, Kindle Fire and Windows 8.1, while ensuring that the corporate network is protected from mobile security threats.

    25 Jun 2014 / PDF: 2.220 MB / DS-370
  • view pdf
    SonicWALL Product Line Brochure

    Dell SonicWALL provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the Dell SonicWALL Global Response Intelligent Defense (GRID) Network, the Dell SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.

    12 Jun 2014 / PDF: 3.960 MB / DS-77
  • view pdf
    SonicWALL Product Lines

    Dell SonicWALL provides intelligent network security and data protection solutions that enable customers and partners to dynamically secure, control, and scale their global networks. Using input from millions of shared touch points in the Dell SonicWALL Global Response Intelligent Defense (GRID) Network, the Dell SonicWALL Threat Center provides continuous communication, feedback, and analysis on the nature and changing behavior of threats.

    12 Jun 2014 / PDF: 3.910 MB / DS-65
  • view pdf
    SonicWALL E-Class Product Line

    Dell SonicWALL E-Class represents a new generation of comprehensive solutions for network security, secure remote access, email security, and policy and management. Engineered to deliver solutions that are intelligent enough to adapt as organizations evolve and as threats evolve—dynamically and globally. Delivering sophistication and broad scalability, E-Class solutions automatically anticipate and adapt to emerging threats, securing any user, device or application from anywhere, with maximum ease of deployment, and at the best economic value in a compliant framework.

    12 Jun 2014 / PDF: 3.960 MB / DS-76
  • view pdf
    Dell SonicWALL TZ Series

    By integrating gateway anti-virus, anti-spyware, intrusion prevention, content filtering, anti-spam and application control, the Dell SonicWALL TZ Series of Unified Threat Management (UTM) Firewalls shatters these limitations by offering high performance multi-layered network protection. Dell SonicWALL Application Intelligence and Control helps administrators control and manage both business and non-business related applications to enable network and user productivity. Utilizing SonicWALL's unique Reassembly-Free Deep Packet Inspection® (RFDPI) technology,* the TZ Series delivers in-depth protection at unparalleled performance.

    23 May 2014 / PDF: 1.510 MB / DS-66
  • view pdf
    IPS US

    -

    18 May 2014 / PDF: 0.940 MB / DS-411
  • view pdf
    Malware Prevention US

    -

    18 May 2014 / PDF: 1.030 MB / DS-410

 of 90 more items  |  all items only  items + show summaries - hide summaries

eBook

 of 27 more items  |  all items only  items + show summaries - hide summaries

  • view pdf
    EBook Securing the Small Business Network

    In recent years the volume of attacks against small businesses has surpassed that of enterprise organizations. However, small businesses do not have the IT staff resources or budgets of larger organizations.

    26 Jun 2014 / PDF: 1.810 MB / EB-252
  • view pdf
    Achieve Deeper Network Security and Control

    Next-generation firewalls (NGFWs) have taken the world by storm, revolutionizing network security as we once knew it. Traditional firewalls that only focus on stateful packet inspection and access control rules are simply not effective in today's advancedthreat environment. In order to safeguard your organization from today's ever-evolving threats, your NGFW must be able to deliver a deeper level of network security.

    5 Feb 2014 / PDF: 4.580 MB / EB-262
  • view pdf
    Achieve Deeper Network Security and Application Control

    Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Traditional firewalls that only focus on stateful packet inspection and access control rules are simply not effective in today's advanced-threat environment.

    31 Oct 2013 / PDF: 4.580 MB / EB-261
  • view pdf
    Guarding the Castle - The strategies and tools of cybercriminals and how to defeat them

    Today's cybercriminals employ several complex techniques to avoid detection as they sneak quietly into corporate networks to steal intellectual property. Their threats are often encoded using multifarious complicated algorithms to evade detection by intrusion prevention systems. Once they have exploited a target, attackers will attempt to download and install malware onto the compromised system. In many instances, the malware used is a newly evolved variant that traditional anti-virus solutions don't yet know about. This ebook details the strategies and tools that cybercriminals use to infiltrate your network and how you can stop them.

    28 Oct 2013 / PDF: 1.220 MB / EB-243
  • view pdf
    12 Things Effective Intrusion Prevention Systems Should Do

    The latest generation of exploits used to attack computer systems relies on extremely sophisticated evasion techniques to escape detection. The most serious of these attacks can provide the attacker with the ability to remotely initiate system-level commands. Today's intrusion prevention systems (IPS) provide advanced security intelligence and the ability to identify and block malware before it can enter your network so that you can defeat these sophisticated evasion techniques. To be effective, your IPS should be able to perform each of the functions listed in the following pages.

    3 Oct 2013 / PDF: 1.580 MB / EB-244
  • view pdf
    E-Book 11 Cool Things Your Firewall Should Do

    Traditional stateful packet inspection firewalls focus on blocking network layer threats by evaluating the ports and protocols used by network layer traffic. The latest Next-Generation Firewalls utilize deep packet inspection to scan the entire packet payload to provide advanced intrusion prevention, antimalware, content filtering and anti-spam.

    15 Aug 2013 / PDF: 0.940 MB / EB-249
  • view pdf
    Ebook 10 Ways to Securely Optimize Your Network

    The rapid evolution of the web has changed the office forever with broad adoption of Web 2.0 and social networking applications which have created an entirely new set of IT requirements for securing, controlling, and ensuring bandwidth in the new enterprise network.

    15 Aug 2013 / PDF: 1.400 MB / EB-246
  • view pdf
    Ebook Controlling Laptop and Smartphone Access to Corporate Networks Final

    With company-issued, IT-controlled laptops, IT has traditionally had the option to lock down the operating system to prevent the installation of potentially insecure or non-approved applications.

    31 Jul 2013 / PDF: 1.550 MB / EB-255

 of 27 more items  |  all items only  items + show summaries - hide summaries

Business Solutions

 of 30 more items  |  all items only  items + show summaries - hide summaries

  • view pdf
    Helping Schools Secure Their Networks While Saving Their Budgets

    The challenges facing grade school educators are greater than ever before. The standards for academic achievement and the expectations of students' families continue to climb. At the same time, education budgets are tighter. Schools' technology infrastructures are caught in the middle, requiring K-12 IT administrators to literally do more with less. Networked resources have addressed some qualitative issues. Online instruction materials and classroom management services supplement teachers' capabilities and free them from administrative chores. In addition, self-service portals and email communications increase the efficiency and effectiveness of administrative staff.

    7 Jul 2014 / PDF: 1.340 MB / SB-29
  • view pdf
    SonicWALL Report Portfolio

    Dell SonicWALL Global Management System (GMS)/ Analyzer Reports and Dell SonicWALL Scrutinizer Reports

    30 Jul 2013 / PDF: 3.980 MB / SB-92
  • view pdf
    Corporate Networks: Business 2.0 and Beyond

    The performance and security needs of corporate networks have evolved greatly in the last five years, driven by changing business and economic demands, different patterns of working and a continuous stream of new technologies. In this environment of 'Business 2.0', the network is the organization's vital beating heart, a strategic business tool used by companies to drive significant competitive advantage. But this central role also brings management, risk and security challenges. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and aff ordability are now the key factors in network decision-making.

    13 Mar 2013 / PDF: 0.800 MB / SB-65
  • view pdf
    Corporate Networks: Business 2.0 & Beyond

    The performance and security needs of corporate networks have evolved greatly in the last five years, driven by changing business and economic demands, different patterns of working and a continuous stream of new technologies. In this environment of 'Business 2.0', the network is the organization's vital beating heart, a strategic business tool used by companies to drive signifi cant competitive advantage. But this central role also brings management, risk and security challenges. This brochure provides a management overview of what's changed and why. But more importantly, it shows why flexibility, visibility, agility and aff ordability are now the key factors in network decision-making.

    13 Mar 2013 / PDF: 0.790 MB / SB-64
  • view pdf
    Benefits of Deploying Dell SonicWALL WAN Acceleration with Dell EqualLogic Storage

    Data backup and replication processes between an enterprise organization's data center and remote replication sites can be significantly slowed in a wide area network (WAN). The effectiveness of WAN applications– including backup and recovery applications–often suffers due to overburdened bandwidth. If bandwidth is low, the resulting latency and packet loss over a WAN connection will adversely affect an enterprise's ability to quickly and efficiently achieve recovery time objective (RTO) and recovery point objective (RPO) goals. Backup and replication operations over the WAN may be delayed and disrupted due to slow data replication and long queuing times that result from WAN bandwidth limitations. To get faster data replication and backup between remote sites and LAN like application performance over the WAN, more organizations are increasingly using Dell? EqualLogic PS Series iSCSI storage area networks (SANs) along with Dell SonicWALL? WAN Acceleration Appliance (WXA) solutions.

    5 Mar 2013 / PDF: 0.710 MB / SB-99
  • view pdf
    Benefits of Deploying Dell SonicWALL WAN Acceleration with Dell EqualLogic Storage

    Data backup and replication processes between an enterprise organization's data center and remote replication sites can be significantly slowed in a wide area network (WAN). The effectiveness of WAN applications–including backup and recovery applications–often suffers due to overburdened bandwidth. If bandwidth is low, the resulting latency and packet loss over a WAN connection will adversely affect an enterprise's ability to quickly and efficiently achieve recovery time objective (RTO) and recovery point objective (RPO) goals. Backup and replication operations over the WAN may be delayed and disrupted due to slow data replication and long queuing times that result from WAN bandwidth limitations. To get faster data replication and backup between remote sites and LAN like application performance over the WAN, more organizations are increasingly using Dell? EqualLogic PS Series iSCSI storage area networks (SANs) along with Dell SonicWALL? WAN Acceleration Appliance (WXA) solutions.

    5 Mar 2013 / PDF: 0.710 MB / SB-98
  • view pdf
    Wireless Guest Services Solution Brief

    Dell? SonicWALL? Wireless Guest Services (WGS) allows guest users to connect wirelessly and securely to the Internet without accessing your protected network resources. Enabled through Dell SonicWALL wireless access, WGS can establish enterprise-secure wireless hotspots in any location where guests, customers or the public congregate and need authorized WiFi access.

    7 Aug 2012 / PDF: 0.650 MB / SB-97
  • view pdf
    Wireless Guest Services Solution Brief

    Dell? SonicWALL? Wireless Guest Services (WGS) allows guest users to connect wirelessly and securely to the Internet without accessing your protected network resources. Enabled through Dell SonicWALL wireless access, WGS can establish enterprise-secure wireless hotspots in any location where guests, customers or the public congregate and need authorized WiFi access.

    7 Aug 2012 / PDF: 0.650 MB / SB-96

 of 30 more items  |  all items only  items + show summaries - hide summaries

White Papers

 of 35 more items  |  all items only  items + show summaries - hide summaries

  • view pdf
    An advanced reputation management approach to stopping email threats

    More sophisticated and complex threats to email systems continue to emerge and require an advanced defensive approach. Traditional single- point defenses such as Sender IP Reputation are no longer a sufficient defense against these new threats. Such single - point defenses represent only an individual layer in a multi-layered Advanced Reputation Management defense that can identify and manage the reputations of not only an email's sender IP address, but also its structure, t ext, embedded URLs, images, attachments, phone numbers and email addresses.

    18 Feb 2014 / PDF: 0.090 MB / WP-135
  • view pdf
    Phishing - When email is the enemy

    Email phishing not only leads the loss of financial, personal and even identity information it can also lead to a loss in confidence in the use of email as a communication medium. Phishing is viewed as a consumer proble m, but just as well can affect business either directly through the loss of information or indirectly through the loss of productivity of a "phished" employee. Often organizations ignore or minimize phishing assuming for their spam filter alone can detect phishing or that employees can easily tell – neither is true. This paper looks at challenges an organization faces in staying ahead of phishing and outlines a framework to incorporate anti - phishing actions into existing processes.

    18 Feb 2014 / PDF: 0.080 MB / WP-134
  • view pdf
    Building a better spam trap

    The nature of spam is changing, incorporating a wide spectrum of email-borne attacks that can stifle productivity, infect corp orate networks and undermine corporate reputation and regulatory compliance. In response, the nature of anti-spam defense is changing as well. Single-point solutions such as Sender IP Reputation should ideally represent only a single layer in a multi-layered defense.

    18 Feb 2014 / PDF: 0.110 MB / WP-133
  • view pdf
    Achieve Deeper Network Security and Control

    Not all next-generation firewalls are the same. Dell™ SonicWALL™ NGFWs are the only firewalls capable of providing organizations of any size with a deeper level of network security. These industry-leading firewalls are designed using a scalable, multi-core hardware architecture and a patented, single-pass, low-latency, Reassembly-Free Deep Packet Inspection® (RFDPI) engine that scans all traffic, regardless of port or protocol. In addition to advanced SSL decryption and IPS capabilities, Dell SonicWALL NGFWs also have access to a cloud database that is updated continually with more than 15 million signatures. Not only that, they're easy to manage and they deliver a low total cost of ownership.

    10 Feb 2014 / PDF: 1.830 MB / WP-132
  • view pdf
    Dell SonicWALL Email Compliance and Encryption service data flow overview

    This document addresses the data flow and security practices for safeguarding the Personally Identifiable Information (PII) and Personal Health Information (PHI) utilized by the Dell SonicWALL Email Compliance and Encryption cloud service. The example outlined uses an email from a Dell SonicWALL user as an example of a sending client. It covers the encryption algorithms used by the cloud encryption service, the stored procedures that govern access control on the encrypted database, and explains how encryption keys are managed by the cloud encryption service. It also describes mitigating risks and quality assurance procedures that enforce these measures.

    9 Feb 2014 / PDF: 0.740 MB / WP-130
  • view pdf
    How Dell SonicWALL Email Compliance and Encryption service enables compliance

    The Dell SonicWALL Email Compliance and Encryption subscription service, an optional service available with Dell SonicWALL Email Security appliances and software, helps organizations achieve regulatory and industry compliance when moving PII (Personally Identifiable Information), PHI (Protected Health Information), proprietary data or any other types of sensitive information. HIPAA/HITECH, GLBA, PCI and other regulations require sensitive data be encrypted when transferred over a public network like the Internet. Since most organizations use email and simple file attachments as the preferred method for business communications, it's imperative that these be secured when transmitting sensitive data.

    9 Feb 2014 / PDF: 0.580 MB / WP-131
  • view pdf
    Dell Network Security Threat Report 2013

    2013 Dell Threat Report summarizes threats statistics for 2013 and outline predictions for threats in 2014.

    5 Feb 2014 / PDF: 3.270 MB / WP-129
  • view pdf
    The SonicWALL Clean VPN Approach for the Mobile Workforce

    The consumerization of IT and bring your own device (BYOD) policies have made it more challenging for IT to secure network access for mobile laptops, smartphones and tablets. The Dell™ SonicWALL™ Clean VPN™ approach unites SSL VPN secure remote access and next-generation firewall technology to deliver layered, defense-in-depth protection for the core elements of business communications: Endpoints and users, data and application resources, and the traffic that connects them.

    15 Oct 2013 / PDF: 0.670 MB / WP-59

 of 35 more items  |  all items only  items + show summaries - hide summaries

Interactive Demos & Guided Tours

 of 24 more items  |  all items only  items + show summaries - hide summaries

 of 24 more items  |  all items only  items + show summaries - hide summaries

Live Webinars

 of 7 more items  |  all items only  items + show summaries - hide summaries

  • register now
    Sécurité mobile: la limite entre usage personnel et professionnel

    Mélange entre données et applications personnelles et professionnelles sur les dispositifs mobiles : quels sont les risques ?

    17 Jan 2014 / LW-190
  • register now
    Mobile Sicherheit: Welche Risiken entstehen, wenn private und geschäftliche Date

    Gemeinsame Nutzung privater und geschäftlicher Daten und Anwendungen auf mobilen Geräten: Welche Gefahren lauern?

    16 Jan 2014 / LW-191
  • register now
    Mobile security; the risks of co-mingling personal and business

    Employees and especially mobile workers are increasingly demanding access to mission-critical data and apps from personal smart phones, tablets and laptops. However, co-mingling of personal and business data and apps on mobile devices can create risk of business data loss and introduction of malware.

    15 Jan 2014 / LW-189
  • register now
    Why it's time to upgrade to a Next-Generation Firewall

    Distributed networks face the ongoing challenge of securing a continually evolving network perimeter. As threats have evolved to exploit the shifting lines of defense, companies have responded by adding additional layers of security. This need for multiple layers of security has placed an enormous strain on IT professionals, increasing their workload through the management of multiple consoles and security devices. Is your firewall capable of handling the growing demands of your business? Many organizations are now migrating to Next-Generation Firewall solutions to reduce complexity, consolidate functionality and increase employee productivity. In fact, analysts predict that by the year-end 2014, 60% of new purchases will be Next-Generation Firewalls. Find out what is driving this phenomenon and you can benefit by these new solutions by attending the Web seminar.

    17 Jul 2013 / LW-173
  • register now
    Shine the light on Shadow IT

    Driven by cloud computing and the consumerization of IT, IT departments are being forced to change how they operate. The explosion of consumer smartphones and tablets for business usage, known as BYOD (bring-your-own-device), is forcing IT organizations to deal with more tech-savvy business users, who are ushering in the era of Shadow IT. As IT departments are painfully aware of the growing practice of hardware devices and software applications that are used for business purposes but are not supported or controlled by the organization’s central IT department. Often IT lacks visibility into usage, which makes it difficult to exert control. Find out how to arm yourself against Shadow IT with Next-Generation Firewalls.

    18 Jun 2013 / LW-168
  • register now
    The Best Approach to VMware Virtual Machine Backups

    Due to continued industry’s increasing growth and adoption of server-virtualization, companies of all sizes benefit from these technology advantages. While each virtual host offers the benefits of powering multiple virtual machines that run various business applications on different operating platforms within a single physical server, the backup and recovery of these virtual infrastructures however can become very convoluted and costly if using legacy per-machine, per-agent-based approaches that were not optimally designed for virtual environments. In this webcast, we will examine some of the principle issues with the different backup approaches of virtual machines that exist today and discuss new technology options specifically designed for protecting VMware virtual machines.

    25 Sep 2012 / LW-140
  • register now
    Enabling Security and Bandwidth Optimization on Higher Education Networks

    The emergence of IT trends such as Web 2.0 and mobility present a challenging balancing act for colleges and universities across the nation. While social media and “Anytime, Anywhere Learning” clearly enrich the learning experience, these developments present IT administrators with an ever-growing list of educational and administrative demands on their network. New bandwidth–hungry Web 2.0 applications and social media sites are overwhelming networks and first-generation firewalls are failing to stop the invasion of application-based threats. Clearly, higher ed IT administrators need to find a better way to manage bandwidth and security on the new application-centric network. Join this webinar to learn from leading security experts on how to use next-generation firewalls to provide content filtering, bandwidth management and prioritization of application traffic for VoIP, video conferencing and social media resources.

    12 Oct 2011 / LW-42

 of 7 more items  |  all items only  items + show summaries - hide summaries

On-Demand Webinars

 of 102 more items  |  all items only  items + show summaries - hide summaries

  • view webinar
    Assurez-vous de la sécurité de votre entreprise pendant les fêtes.

    La saison des achats de fêtes de fin d'année a commencé avec pour conséquence un nombre record d’acheteurs en ligne, dont vos employés. Cette année, veillez à ce que votre réseau soit protégé et que vos employés soient autant productifs pendant les fêtes que toute l’année.

    29 Dec 2013 / ODW-186
  • view webinar
    Connected Security: Respond to 2014's Challenges

    We will look at major trends driving business decisions and then talk about how you can ensure that your IT security efforts can be a business enabler to support innovation and ultimately success in today’s demanding marketplace. Join us to learn how to: • Respond quickly to security threats and problems before they negatively impact the business. • Protect every part of the infrastructure – inside and outside the network – reducing the number of vendors and disparate solutions and gaining efficiencies by reducing costs. • Provide common-sense reporting that spans across areas of the network and infrastructure, helping to reduce the risk of errors from missed problems or threats, and saving time. • Unify the patchwork of processes, reducing the complexity of meeting security and compliance objectives

    5 Dec 2013 / ODW-188
  • view webinar
    The holiday online shopping season is here. Are you prepared?

    The holiday buying season is upon us, and that means record numbers of online shoppers, including your employees. This year, make sure your network is protected and your employees remain productive before Christmas and all through the New Year by joining our webinar, Protection and Productivity during the Holiday Season.

    28 Nov 2013 / ODW-185
  • view webinar
    Sorgen Sie dafür, dass Ihre Organisation in der Weihnachtszeit sicher bleibt.

    Der Startschuss für die Weihnachtsshopping-Saison ist gefallen. In dieser Zeit nutzen Millionen Menschen das Internet, um Geschenke online einzukaufen – auch während der Arbeitszeit. Nehmen Sie an unserem Webinar Schutz und Produktivität in der Weihnachtszeit teil. Wir sagen Ihnen, was Sie tun müssen, damit Ihr Netzwerk geschützt ist und Ihre Mitarbeiter produktiv bleiben – egal ob vor der Weihnachtszeit oder im neuen Jahr.

    27 Nov 2013 / ODW-187
  • view webinar
    Protection and Productivity During the Holiday Buying Season

    The holiday buying season featuring Cyber Monday is here again and that means online shopping. Lots of it. Find out how to keep your network secure from cyber-criminals and your employees focused by ensuring Internet bandwidth is reserved solely for critical business activity.

    12 Nov 2013 / ODW-184
  • view webinar
    Der mobile Wahnsinn – Strategien, um mobile Sicherheitsbedrohungen in den Griff

    Immer mehr Mitarbeiter wünschen sich einen schnellen und einfachen mobilen Zugriff auf geschäftskritische Unternehmensanwendungen. In diesem Webinar beschäftigen wir uns mit mobilen Sicherheitsbedrohungen und stellen Strategien vor, mit denen Sie mobiles Arbeiten ermöglichen und gleichzeitig das Risiko für Ihre IT-Infrastruktur senken können.

    31 Oct 2013 / ODW-179
  • view webinar
    Dans la folie de la mobilité : stratégies pour limiter les menaces mobiles

    La demande d’un accès simple aux applications indispensables via nos mobiles ne cesse de croître. Durant cette session, nous évoquerons les menaces que cela représente pour la sécurité de l’entreprise ainsi que les stratégies permettant d’offrir la mobilité nécessaire aux employés, tout en minimisant les risques pour l’infrastructure informatique des organisations.

    30 Oct 2013 / ODW-180
  • view webinar
    Mobile Madness - Strategies to mitigate Mobile Security Threats

    Demand for fast, easy mobile access to mission-critical business applications is on the rise. In this session we’ll outline the mobile security threats this presents and strategies to enable mobile workers while minimizing risk to IT infrastructure.

    29 Oct 2013 / ODW-181

 of 102 more items  |  all items only  items + show summaries - hide summaries