WatchGuard Technologies continues to add key partnership across the globe, including the most recent announcement that Fujitsu Fsas, the leading IT and technical support services provider in Japan, is now integrating WatchGuard NGFW/UTM appliances into its managed security services. Managed security solutions are gaining popularity as the volume and complexity of security threats continue to … Continue reading
Speed. Power. Beauty. Deep red paint. Futuristic styling. As the media explores the 43rd Tokyo Motor Show this week, they won’t see any of those things. The WatchGuard XTM 2520 and XTM 870 boxes will be in the server cabinet doing what they do best: protecting the data of thousands of people. WatchGuard is the … Continue reading
Assessing the potential value of an investment can be challenging. In the face of projections and assumptions, determining real value can require calculations that don’t always include all of the available variables. So, when we were exploring the best way to provide the market with an economic analysis of our integrated security platform (XTM), we … Continue reading
As the global economy continues to unify, the global demand for flights rose 7.5 percent in August compared to last year. As more travelers take to the air, the need for the airlines to be aligned on compliance issues and international standards continues to be in high demand. This is why ACS Aviation Solutions has … Continue reading
Growth is exciting! Growth brings opportunities! Growth can also be somewhat scary when you’re goal is providing network security to three large, city campuses while also providing secure remote access to 40,000 students and over 1,500 staff. That’s what Dave Newsham, the ITSS Service Delivery Manager at Leeds City College in the UK, was challenged … Continue reading
Achieving secure connectivity with failover, content-based Web filtering and centralized management of more than 500 locations is never an easy task for an IT team, but when it’s a financial institution with over 2,250 employees based globally it gets even more complex. This is what Adarsh Credit Co-Cooperative Society, a leading multi-state financial institution in … Continue reading
Over the past decade, during the journey of server virtualization from primarily dev/test environments to mission-critical deployment on-premise and in the cloud, the applications that have led the way have been the email and web services that power most businesses. And as those business-critical uses keep growing so to do the need to keep them … Continue reading
Being able to assess incoming threats in real time, export reports that inform key decision makers and analyze network usage as it ebbs and flows is a vital tool for fighting the threats, vulnerabilities and attacks that businesses around the world face. In network security, visibility is protection. Unfortunately, a recent survey by the SANS … Continue reading
When a tornado tore through Walker School District’s data center in 2011, the devastation took 95% of the district’s technology infrastructure. Turning tragedy into opportunity, the administrators worked to rebuild and support the district’s commitment to creating amazing educational opportunities for their students. This meant technology that could support key educational resources, and provide access … Continue reading
“Information security” is not just for businesses looking to safeguard their intellectual property, financial data or customer data. It is also a vital component of ensuring that students around the world maintain a positive learning environment. As we detailed in our last post, the ability to support numerous devices per student, enable access to public … Continue reading
Just like Principals and Superintendents, school district Network Administrators are facing the challenges of having to do more with less. Many school districts only have a small handful of IT personnel to begin with, their budgets are being reduced and they’re dealing with challenges to network security management. On top of all this, new challenges … Continue reading
With cloud computing and BYOD permeating almost every organization, shadow IT is beginning to make its way onto the radar screens of business leaders inside and outside of the IT department. The truth is, however, that shadow IT has been around for decades and is not necessarily a bad thing. Shadow IT are systems and … Continue reading
This post is by Roger Klorese, director of product management at WatchGuard. 1+1=3. No, I didn’t flunk second-grade math. I’m talking about the phenomenon that when you put good things together, you can get great things – a sum that is more than its parts. The WatchGuard XTM solution for Unified Threat Management is a … Continue reading
As goes the Internet, so goes security for the content it carries: throughput is king. As the volume of email and the amount of information it carries continues to increase exponentially, vendors like WatchGuard need to deliver more performance in our enterprise content security solutions. Sure, we could add more cores and more hard disk … Continue reading
This post is by Roger Klorese, WatchGuard’s Director of Product Management. Two-thirds of the North American and European workforce report that they work outside the corporate office at least occasionally every month. Marissa Mayer may not like it, but “work from home” is here to stay. The ability to quickly and securely connect to a … Continue reading
This post is by Roger Klorese, WatchGuard’s Director of Product Management. When we talk about security and compliance requirements, the discussion is usually about keeping bad stuff out — protecting the network from threats, in the form of intrusions, malware, phishing spam, or others. And that’s the view most organizations take to the problem. But they’re … Continue reading
With the potential to reduce network security cost by nearly 50 percent, it’s no wonder unified threat management (UTM) has climbed up the Gartner hype cycle at a feverish pace. But many companies have held out for fear that a UTM solution’s standard features would slow network performance to a crawl in order to protect … Continue reading
Java (not the coffee) can be found on most computers and mobile devices these days, despite the fact that most operating systems don’t need it. The pervasive nature of Java (not the coffee) along with its familiarity is a hackers dream; fueled in part by what we call ‘drive-by download attacks.’ This is where a … Continue reading