SonicWALL Security Products | Partners | Contact Sales 1-800-509-1265
Search

 •   • 

Resources

Filter By:
Solution
Language
Category:

White Papers

 of 35 more items  |  all items only  items + show summaries - hide summaries

  • view pdf
    An advanced reputation management approach to stopping email threats

    More sophisticated and complex threats to email systems continue to emerge and require an advanced defensive approach. Traditional single- point defenses such as Sender IP Reputation are no longer a sufficient defense against these new threats. Such single - point defenses represent only an individual layer in a multi-layered Advanced Reputation Management defense that can identify and manage the reputations of not only an email's sender IP address, but also its structure, t ext, embedded URLs, images, attachments, phone numbers and email addresses.

    18 Feb 2014 / PDF: 0.090 MB / WP-135
  • view pdf
    Phishing - When email is the enemy

    Email phishing not only leads the loss of financial, personal and even identity information it can also lead to a loss in confidence in the use of email as a communication medium. Phishing is viewed as a consumer proble m, but just as well can affect business either directly through the loss of information or indirectly through the loss of productivity of a "phished" employee. Often organizations ignore or minimize phishing assuming for their spam filter alone can detect phishing or that employees can easily tell – neither is true. This paper looks at challenges an organization faces in staying ahead of phishing and outlines a framework to incorporate anti - phishing actions into existing processes.

    18 Feb 2014 / PDF: 0.080 MB / WP-134
  • view pdf
    Building a better spam trap

    The nature of spam is changing, incorporating a wide spectrum of email-borne attacks that can stifle productivity, infect corp orate networks and undermine corporate reputation and regulatory compliance. In response, the nature of anti-spam defense is changing as well. Single-point solutions such as Sender IP Reputation should ideally represent only a single layer in a multi-layered defense.

    18 Feb 2014 / PDF: 0.110 MB / WP-133
  • view pdf
    Achieve Deeper Network Security and Control

    Not all next-generation firewalls are the same. Dell™ SonicWALL™ NGFWs are the only firewalls capable of providing organizations of any size with a deeper level of network security. These industry-leading firewalls are designed using a scalable, multi-core hardware architecture and a patented, single-pass, low-latency, Reassembly-Free Deep Packet Inspection® (RFDPI) engine that scans all traffic, regardless of port or protocol. In addition to advanced SSL decryption and IPS capabilities, Dell SonicWALL NGFWs also have access to a cloud database that is updated continually with more than 15 million signatures. Not only that, they're easy to manage and they deliver a low total cost of ownership.

    10 Feb 2014 / PDF: 1.830 MB / WP-132
  • view pdf
    Dell SonicWALL Email Compliance and Encryption service data flow overview

    This document addresses the data flow and security practices for safeguarding the Personally Identifiable Information (PII) and Personal Health Information (PHI) utilized by the Dell SonicWALL Email Compliance and Encryption cloud service. The example outlined uses an email from a Dell SonicWALL user as an example of a sending client. It covers the encryption algorithms used by the cloud encryption service, the stored procedures that govern access control on the encrypted database, and explains how encryption keys are managed by the cloud encryption service. It also describes mitigating risks and quality assurance procedures that enforce these measures.

    9 Feb 2014 / PDF: 0.740 MB / WP-130
  • view pdf
    How Dell SonicWALL Email Compliance and Encryption service enables compliance

    The Dell SonicWALL Email Compliance and Encryption subscription service, an optional service available with Dell SonicWALL Email Security appliances and software, helps organizations achieve regulatory and industry compliance when moving PII (Personally Identifiable Information), PHI (Protected Health Information), proprietary data or any other types of sensitive information. HIPAA/HITECH, GLBA, PCI and other regulations require sensitive data be encrypted when transferred over a public network like the Internet. Since most organizations use email and simple file attachments as the preferred method for business communications, it's imperative that these be secured when transmitting sensitive data.

    9 Feb 2014 / PDF: 0.580 MB / WP-131
  • view pdf
    Dell Network Security Threat Report 2013

    2013 Dell Threat Report summarizes threats statistics for 2013 and outline predictions for threats in 2014.

    5 Feb 2014 / PDF: 3.270 MB / WP-129
  • view pdf
    The SonicWALL Clean VPN Approach for the Mobile Workforce

    The consumerization of IT and bring your own device (BYOD) policies have made it more challenging for IT to secure network access for mobile laptops, smartphones and tablets. The Dell™ SonicWALL™ Clean VPN™ approach unites SSL VPN secure remote access and next-generation firewall technology to deliver layered, defense-in-depth protection for the core elements of business communications: Endpoints and users, data and application resources, and the traffic that connects them.

    15 Oct 2013 / PDF: 0.670 MB / WP-59
  • view pdf
    Making Smarter Mobile Access Decisions

    Smartphones and tablets are everywhere today — equally found in the hands of consumers or employees of enterprise organizations. But for all their apparent user-friendly features, these mobile devices can represent a significant threat to corporate data. This paper examines mobile platform security vulnerabilities and what IT departments need to know before allowing smartphone and tablet access to corporate data, discusses how to protect infrastucture from mobile security threats and presents useful advice on how Dell™ SonicWALL™ solutions can help meet those needs.

    15 Oct 2013 / PDF: 0.750 MB / WP-109
  • view pdf
    Best Practices for Secure Mobile Access - A Guide to the Future

    Today, more people are working from more locations using more devices than ever before. Organizations are eager to reap the benefits of a mobile workforce but they cannot afford to sacrifice security. This paper explains how you can implement secure mobile access in a controlled, step-by-step manner, so you can enable your increasingly mobile workforce while ensuring the security of your enterprise.

    15 Oct 2013 / PDF: 0.780 MB / WP-18
  • view pdf
    What to Look for When Evaluating Next-Generation Firewalls

    In this paper, we will summarize the results of three independent tests that can help you select a Next-Generation Firewall for your organization. We also provide links to the portions of the research that have been made public, so you can examine the details yourself.

    18 Jun 2013 / PDF: 0.310 MB / WP-127
  • view pdf
    IT security trends in 2013

    The commoditization of the cloud, widespread adoption of mobile devices as replacements for computers, and the growth of Bring Your Own Device (BYOD) in the enterprise give rise to a security landscape that is significantly different than what IT departments have traditionally encountered. Threats are more dynamic, more diverse, and more costly in their repercussions. Thought leaders at Dell ™ SonicWALL ™ have taken a high-level assessment of this evolving landscape and identified the top trends to factor into IT strategy development in 2013. The key trends identified are examined below

    6 Jun 2013 / PDF: 0.450 MB / WP-126
  • view pdf
    Next-Generation Firewalls:Critical to your organization's network security

    That's why organizations need to deploy a Next-Generation Firewall (NGFW) as an integral part of their overall security strategies. A NGFW can bolster your protection against the constantly evolving threat environment.

    2 Apr 2013 / PDF: 0.790 MB / WP-125
  • view pdf
    Effective Security in a BYOD Environment

    For all of the hype around the consumerization of IT, the concept is really not new. After all, end users have been connecting to corporate networks from their own home-based PCs and laptops for years. However, what has changed is the virtual explosion in the number of mobile devices in use and the increasing desire by consumers to use their own devices for both business and personal purposes. In 2012, consumer research firm Nielsen reported that 50.4% of U.S. consumers now use a smartphone. This translates to more than 110 million smartphones (and climbing) in the U.S. alone.

    3 Jan 2013 / PDF: 0.210 MB / WP-124
  • view pdf
    Tackling Consumerization of IT

    Given the ever-growing number of mobile devices sold to consumers, managing workers who want to utilize their own mobile devices for business use has become a daunting task. According to analyst firm IDC, smartphone vendors were expected to ship 472 million smartphones in 2011 compared to roughly 305 million units shipped in 2010. IDC expects that figure will nearly double to 982 million by the end of 2015.

    12 Nov 2012 / PDF: 0.230 MB / WP-118
  • view pdf
    Building a Better Spam Trap

    The nature of spam is changing, incorporating a wide spectrum of email-borne attacks that can stifle productivity, infect corporate networks and undermine corporate reputation and regulatory compliance. In response, the nature of anti-spam defense is changing as well. Single-point solutions such as Sender IP Reputation should ideally represent only a single layer in a multi-layered defense.

    12 Nov 2012 / PDF: 0.110 MB / WP-119
  • view pdf
    Why Protection and Performance Matters Final

    Protection and performance go hand-in-hand for Next-Generation Firewalls (NGFWs). Organizations should not have to sacrifice throughput and productivity for security. Outdated firewalls pose a serious security risk to organizations since they fail to inspect data payload of network packets. Many vendors tout Stateful Packet Inspection (SPI) speeds only, but the real measure of security and performance is deep packet inspection throughput and effectiveness.

    12 Nov 2012 / PDF: 0.140 MB / WP-120
  • view pdf
    Holiday shopping

    How to avoid hits to network security, worker productivity and bandwidth availability when employees shop on the job

    11 Nov 2012 / PDF: 0.280 MB / WP-115
  • view pdf
    10 Easy Steps to Secure Your Small Business

    Small business network administrators need a workable plan to provide comprehensive security against today's sophisticated threats without spending too much time or money. This white paper presents a simple step-by-step approach to leveraging advanced protection technology in ways that are affordable, fast and easy

    11 Nov 2012 / PDF: 0.060 MB / WP-117
  • view pdf
    An Advanced Reputation Management Approach to Stopping Emerging Email Threats

    More sophisticated and complex threats to email systems continue to emerge and require an advanced defensive approach. Traditional single-point defenses such as Sender IP Reputation are no longer a sufficient defense against these new threats

    11 Nov 2012 / PDF: 0.050 MB / WP-123
  • view pdf
    The wild world of malware

    Threats are continuously evolving but your firewall protection may not. Now is the time to look beyond traditional network security and incorporate protection against malware and exploits that pass through PCs and mobile devices when users browse the Internet, send or receive email and download applications

    11 Nov 2012 / PDF: 0.090 MB / WP-121
  • view pdf
    The Promises and Pitfalls of BYOD

    The Bring Your Own Device (BYOD) trend is in full swing, as enterprises are
    beginning to realize a number of benefits from letting employees choose the
    device they use to get their jobs done. According to the Computerworld
    “Consumerization of IT” study published in October 2011, about half of the 604
    respondents said their organizations allow employees to do work using their own
    devices either away from the office or at work. These companies know that by
    allowing employees to use personal devices they are improving productivity and
    job satisfaction. What's more, enterprises can significantly reduce costs as
    well as embrace the concept of virtual teams by leverag¬ing geographically
    dispersed talent. Businesses can also allow for flexible work hours by letting
    workers use their device of choice—be it a smartphone, tablet or laptop— any
    time, from anywhere.

    9 May 2012 / PDF: 1.410 MB / WP-113
  • view pdf
    The Enterprise Business & IT Case for Application Traffic Flow Analytics

    Enterprise organizations are under increasing pressure to minimize costs,optimize capital investment and minimize monthly Internet service costs. At the same time, non-business-related web traffic, such as social media, is increasing exponentially, draining bandwidth and productivity out of their networks. Enterprises are constrained by outdated monitoring and reporting tools that provide limited visibility into ports and protocols yet lack insight into application traffic flow across the firewalls, routers and switches on their networks. What's more, traditional firewalls do not always adequately stop threats originating from infected hosts inside their networks. The SonicWALL® Application Traffic Analytics solution provides enterprises with the tools they need to solve these problems by providing an in-depth view into their network.

    27 Apr 2012 / PDF: 0.100 MB / WP-111
  • view pdf
    The MSP Business & IT Case for Application Traffic Flow Analytics

    Managed service providers (MSPs) need to support customers that are under increasing pressure to minimize costs, optimize capital investment and minimize monthly Internet service costs. At the same time, non-business-related web traffic, such as social media, is increasing exponentially, draining bandwidth and productivity out of customer networks. MSPs are constrained by outdated monitoring and reporting tools that provide limited visibility into ports and protocols yet lack insight into application traffic flow across the firewalls, routers and switches on customer networks. What's more, traditional firewalls do not always adequately stop threats originating from infected hosts inside customer networks. The SonicWALL® Application Traffic Analytics solution provides MSPs with the tools they need to solve these problems by providing an in-depth view into their network.

    27 Apr 2012 / PDF: 0.120 MB / WP-110
  • view pdf
    The Wild World of Malware: Keeping Your Company Safe

    Malware continues to plague the business network landscape. But even as the criminals producing malware have become larger and more sophisticated, the technology to thwart them has grown equally sophisticated. Now even the smallest companies can enjoy levels of protection that essentially inoculate them from many forms of malware. And these companies can do so cost effectively. By recognizing the threat contemporary malware represents, and by implementing a contemporary security solution, the wild world of malware can be left in the wild. And business can proceed safely, efficiently, and profitably.

    16 Mar 2012 / PDF: 0.090 MB / WP-104
  • view pdf
    NSS Labs Next-Generation Firewall Security Value Map

    NSS Labs Next-Generation Firewall Security Value Map, Feb. 2012

    5 Mar 2012 / PDF: 1.990 MB / WP-102
  • view pdf
    Chinese white paper-BYOD [19451]

    ####(BYOD)#IT########################,#Facebook######,#Twitter®#####,#LinkedIn®########“####(BYOD)”###########################,#################,BYOD##########BYOD####################################,##################

    1 Mar 2012 / PDF: 0.270 MB / WP-103
  • view pdf
    IDC Vendor Spotlight: A Perfect Security Storm Challenges Higher Education

    The network security needs of higher education institutions are ever-changing and vendors that want to remain successful must adapt. Organizations are demanding great flexibility in the solutions they purchase. Acquiring an additional box for every new threat that is identified is no longer an option. Companies want to know that their investment will be protected and will scale as they grow. Increasingly integrated solutions and virtual security appliances are being considered to address these needs.

    27 Jan 2012 / PDF: 0.710 MB / WP-101
  • view pdf
    IDC Vendor Spotlight - A Perfect Security Storm Challenges Higher Education

    The network security needs of higher education institutions are ever-changing and vendors that want to remain successful must adapt. Organizations are demanding great flexibility in the solutions they purchase. Acquiring an additional box for every new threat that is identified is no longer an option. Companies want to know that their investment will be protected and will scale as they grow. Increasingly integrated solutions and virtual security appliances are being considered to address these needs.

    27 Jan 2012 / PDF: 0.710 MB / WP-100
  • view pdf
    IDC Vendor Spotlight - A Perfect Security Storm Challenges Higher Education

    The network security needs of higher education institutions are ever-changing and vendors that want to remain successful must adapt. Organizations are demanding great flexibility in the solutions they purchase. Acquiring an additional box for every new threat that is identified is no longer an option. Companies want to know that their investment will be protected and will scale as they grow. Increasingly integrated solutions and virtual security appliances are being considered to address these needs.

    27 Jan 2012 / PDF: 0.710 MB / WP-99
  • view pdf
    Controlling Laptop and Smartphone Access to Corporate Networks

    Smartphones have joined laptops as de facto network endpoints in corporations, academic institutions and government entities. In managing security for these mobile devices, IT must be aware of the differences, as well as similarities, between laptop and smartphone platforms. With these distinctions in mind, IT can apply best practices to ensure the confidentiality and security of corporate communications from both inside and outside of the network perimeter.

    30 Nov 2011 / PDF: 0.100 MB / WP-1
  • view pdf
    Twelve Ways Applications and Users Are Draining Your Bandwidth and How to Fix It

    Network managers and business owners struggle with the ever-growing demands for more bandwidth on their networks. They typically buy more bandwidth to try to catch up to demand, but the cost, even with declining pricing for Internet connections in some areas, can soon become a money pit. They are looking for better solutions because of cost or limitations in infrastructure. Isn't there a better way to obtain fast and secure data transmissions across a business's multiple locations?

    26 Sep 2011 / PDF: 0.190 MB / WP-95
  • view pdf
    Quick Guide: SSL VPN Technical Primer

    This primer explains the basics of SSL VPN technology and includes distinguishing factors between Internet Protocol Security (IPSec) and SSL VPN technologies.

    22 Jul 2010 / PDF: 0.450 MB / WP-15
  • view pdf
    SonicWALL Virtual Assist: Clientless Remote Support Over SSL VPN

    This white paper evaluates the technical and business criteria for an effective clientless remote support implementation, and weighs the business benefits and competitive advantages of the SonicWALL® Virtual Assist solution.

    22 Jul 2010 / PDF: 0.330 MB / WP-14
  • view pdf
    IPSec vs. SSL VPN: Transition Criteria and Methodology

    In this white paper, you will learn how to assess your VPN needs, identify the limitations and optimal uses of IPSec, understand the benefits of an SSL VPN, consider key remote access configuration variables and examine the particular use cases in which you might keep IPSec.

    22 Jul 2010 / PDF: 0.130 MB / WP-13

 of 35 more items  |  all items only  items + show summaries - hide summaries