Date

By Year

By Type

  • In The News (1285)

By Topic

By Product Category

By Services

By Technologies

By Industry

By Audience

By Language

Displaying 1531 to 1560 of 1615

Tech Brief

The iPad app that was famous for a few hours, a web browser that strips away adverts, and the man who bought his local police website as revenge for a speeding ticket.
  • 0
  • 2169

Financial Services Firms Face Social Media Compliance Challenges

Brokerages and other financial services firms turning to sites like Facebook and Twitter for marketing and customer outreach face a number of thorny social media compliance issues.
  • 1
  • 2142

Back to the Future

The life of leisure has been postponed. Instead, Michael Lehman has gone back to the future in a sense, taking on the CFO role at Palo Alto Networks, a pre-IPO company in the enterprise network-security industry.
  • 0
  • 1848

Top Concerns of Silicon Valley Business Leaders

For seven years the Silicon Valley Leadership Group has asked member companies in high tech, biotech, financial services and related industries to participate in a business climate survey.
  • 0
  • 1834

Appliance Approach Secures Australian Blue Chips

Nir Zuk, founder and CTO of Palo Alto Networks, is passionate about technology, and has little patience for large, slow-moving bureaucracies.
  • 0
  • 2157

Interview: Nir Zuk, Chief Technology Officer, Palo Alto Networks

Nir Zuk, founder and CTO of Palo Alto Networks, is passionate about technology, and has little patience for large, slow-moving bureaucracies.
  • 0
  • 2207

Magic Quadrant Says Now is the Time for Next-Generation Firewalls

You've heard the buzz about next-generation firewalls -- intelligent firewalls that dig deeper than port number and into application visibility.
  • 0
  • 1877

Social Networks Pervasive in Regulated Industries

The spread of social networks in the enterprise is happening at a far greater rate than is generally believed, according to a report just released by network security firm Palo Alto Networks.
  • 0
  • 1875

Security Risks Rise as Enterprises Go Social

Sure, social networks are all the rage on the consumer Web, and industry observers have noted that enterprises aren't far behind. But the rush to embrace social technologies carries a heightened security risk, experts warn.
  • 0
  • 1839

Social Networking Risks Under Little Control

While social media is pervasive in organizations worldwide, usage has far outpaced controls, according to the latest study conducted by Palo Alto Networks.
  • 0
  • 1894

Facebook, Google Apps Use Soars in Enterprises, Security Firm Says

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.
  • 0
  • 1873

Enterprise Networking: Google Apps, Facebook Devour Enterprise Network Bandwidth

Palo Alto Networks surveyed Web application usage at 347 organizations and found Facebook, Twitter and other programs for communications and collaboration are all being used in enterprises to a great degree. Some 22 Google applications, including Gmail, Google Calendar, Google Docs and Google Wave, showed particularly strong usage, according to research from the network security firm.
  • 0
  • 1897

Security: Shining a Spotlight on Social Media Risks

New reports from Palo Alto Networks and Webroot indicate that security consciousness is growing among social networkers but so are the risks, especially in highly regulated industries. Channel Insider takes a closer look at what this means for the channel.
  • 0
  • 1891

Tech Apocalypse: Five Doomsday Scenarios for IT

Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
  • 0
  • 1920

Innovation is Discovered at RSA 2010

The RSA Conference is wrapping up, and it was a much more upbeat experience than the past couple of years. Exhibitors were happy with the booth traffic, many interviewed executives reported sizable year-over-year revenue gains, and most were optimistic about prospects for the balance of 2010.
  • 0
  • 2740

Cell user? Online Networker? Prepare to be Hacked!

With the hue and cry at this year’s RSA Security Conference in San Francisco about the lack of security for users in the mobile “cloud,” it begs the question: what are people doing about it?
  • 0
  • 2391

Products of the Week

Next-generation firewalls from Palo Alto Networks combine three identification technologies to provide the unprecedented visibility and policy control over applications, users and content – all in a high-performance firewall platform.
  • 0
  • 1934

How to Safely Enable Enterprise 2.0 Applications in the Workplace

The adoption and usage of Enterprise 2.0 applications in the workplace is growing at astronomical rates. While there is ample proof of the business benefits of their use, there continue to be major security and compliance risks associated with them.
  • 0
  • 1959

Social Networking Everywhere

The growth of applications like Twitter and Facebook over the last year has been astounding. At Palo Alto Networks, Worldwide Marketing VP Rene Bonvanie says that presents a problem for many employers.
  • 0
  • 2039

Powerful Firewall Protection

Firewalls first came out in the late 1980s when security breaches drew attention to the need to make networks more secure. In those early days, just having a firewall made a network more secure, because hackers hadn’t yet written applications that could get around it. But as hackers have created new applications, the firewall has become like a utility belt with more and more necessary gadgets—URL filtering, content filtering, intrusion detection—to block new threats that can dodge the firewall’s port-based security.
  • 0
  • 2720

A Key Benefit of Next-Generation Firewalls: More Sleep

There’s a great article on SearchEnterpriseWAN about a Palo Alto Networks customer. IDT spoke to SearchEnterpriseWAN about its experiences using next-generation firewalls from Palo Alto Networks, and discussed some of the benefits and changes their team recognized in managing security across their enterprise.
  • 0
  • 2563

Global Carrier Simplifies WAN Security with Next-Generation Firewalls

Wide area network (WAN) operations should include more than security management, but one global telecom operator drowning in thousands of firewall requests for its data centers around the world found little time to do much else.
  • 0
  • 1903

The Top 100 IT Projects of 2009

2009 InfoWorld 100 Awards: IT remains the lifeblood of forward-thinking organizations, as this year's recipients of InfoWorld's highest honor attest.
  • 0
  • 1962

IDT Corporation Deploys Palo Alto's PA-4000 Series Next-Gen Firewalls

Palo Alto Networks, a provider of next-generation enterprise firewalls, has announced that its PA-4000 Series firewalls have been selected by IDT Corporation, a Fortune 1000 company that delivers local, long-distance and calling card services.
  • 0
  • 1840

Palo Alto Networks Preps For (Another) Channel Close-Up

A year that began with a somewhat confusing channel development for Palo Alto Networks is set to end with the company's foot on the gas pedal.
  • 0
  • 2001

Campus Technology

  • 0
  • 1899

Study: Social Networks, Google Docs Becoming Business Applications

The use of Facebook, Twitter and Google Docs in the workplace has increased dramatically in the past six months and their crossover from personal to business applications is accelerating, according to a new study released Monday.
  • 0
  • 1966

Social Networking Use Reaches Very High Levels as Businesses Continue To Be Unprepared Against Risks

Companies have outdated IT infrastructure and usage policies that may fail to protect them from growing risks.
  • 0
  • 1840

Web 2.0 Becomes More Popular at Work but Brings Risks Too, Report Says

If you use one of those ever-popular social networking applications for work purposes, or just for personal business while on the job, then you aren't alone, according to a recent industry report, but such usage can harm your network security as well.
  • 0
  • 1939
Displaying 1531 to 1560 of 1615