Make smart and accurate
software selection decisions
Podcasts, Webinars, and Videos
Interactive Case Studies
ERGO Decision Support System
Private Label Partnerships
TEC Case Studies
Software Evaluation Reports
Meet TEC's Experts
News and Press Releases
Working at TEC
Partner with TEC
Find the latest technical white papers, webcasts, and product information to help you make intelligent IT product purchasing decisions.
Refine your search by:
Competitor Analysis Report
Interactive Case Study
TEC Buyers Guide
Technology Evaluation Centers
Firewall for Beginners
Download this white paper to find out about the different types of firewalls, their features, and how to implement a firewall solution.
IBM Firewall Discontinued
IBM plans to discontinue development and support of its AS/400 firewall and is referring existing customers to Axent, Checkpoint, and Cisco.
InsideOut Firewall Reporter
InsideOut Firewall Reporter is a browser-based firewall reporting tool that brings an organization’s attention to risk factors. It provides visibility by turning an endless stream of connection data into a real-time interactive display that that can be viewed by any parameter including user, bandwidth use, or blocked connections. InsideOut's report-generating ability validates a firewall’s operation by summarizing data for any time period selected, and helps confirm that the firewall is doing what it's supposed to do. The solution is offered in two editions: Standard and Enterprise.
Firewall Software Evaluation Report
Firewalls protect enterprise computer systems from attacks by individuals wishing to crack or otherwise compromise an internal network. The firewall Software Evaluation Report addresses requirements for network interfaces and protocols, content filters, VPN capacity, and other security characteristics.
Human-Machine Interaction Company Ramps Up Firewall Product Line
Will firewalls and sign-language soon be interactive? If anyone can do it, Cybernet Systems will be the first.
Firewall RFI/RFP Template
Firewall Type, Decision Engine, Scalability, Network Interfaces, Operating Systems, Routing and Network Protocols, SNMP, NAT, Policy Features, Proxies, Authentication, Logging, Content Filtering, VPN and Encryption, Attack Resiliency, Certification, and more
InsideOut Makes Firewall Reporting Useful
Firewall logs can be cryptic and very difficult to analyze. There are a number of firewall reporting products on the market that attempt to address this problem, however one particular product recently caught our attention.
Microworld Technologies, Inc.
How many times do you hear network administrators scream at the top of their voice, "I have spent millions of dollars buying expensive and the best antivirus software solutions and yet every two months, when a new virus strikes, I have my entire network go down!" This is a common complaint you will get to hear from one and all network administrators, primarily because most security vendors today concentrate more on a "reactive" approach to stop virus attacks, than a “preventive” approach!
A Firewall is Cheaper Than a Lawyer
eBay's motion for a preliminary injunction to limit Bidder's Edge online auction search engine from linking to their site, may set precedents for future interstate web links. On the other hand, proper implementation of a firewall makes the whole case a moot point.
Results 1 - 10 of 229
Interested in a better way to make software decisions?
Give us a call now: 1-800-496-1303 ext:404
Software Requirements Sets and Comparison Reports
Click here to leverage the experience of our 360 industry perspective