-
Research
and PublicationsStay -
Conferences
and EventsAnnual Conference
October 15–18, 2013
Register now!Events for all Levels and Interests
Whether you're looking for a conference to attend face-to-face to connect with peers, or for an online event for team professional development, see what's upcoming.
Stay -
Career
DevelopmentEDUCAUSE Institute
Leadership/Management Programs
Explore MoreCareer Center
Leadership and Management Programs
EDUCAUSE Institute
Advanced Programs
Project Management
Jump Start Your Career Growth
Explore EDUCAUSE professional development opportunities that match your career aspirations and desired level of time investment through our interactive online guide.
Stay -
Focus Areas
and InitiativesLatest Topics
EDUCAUSE organizes its efforts around three IT Focus Areas
Join These Programs If Your Focus Is
Stay -
Connect
and ContributeFind Others
Get on the Higher Ed IT Map
Employees of EDUCAUSE member institutions and organizations are invited to create individual profiles.
Stay -
About
EDUCAUSEUncommon Thinking for the Common Good™
EDUCAUSE is the foremost community of higher education IT leaders and professionals.
Stay
Subscribe
Filter by type
Filter by Publications
Filter by Presentations
Filter by Library Taxonomy
- Firewalls [x]
- Cybersecurity (38)
- Network Security and Applications (38)
- Security Management (22)
- Intrusion Detection and Prevention (11)
- Policy and Law (11)
- Identity and Access Management (10)
- Campus Policies (9)
- Campus Policy and Law (9)
- Security Policies (9)
- Security Risk Assessment and Analysis (9)
- Authentication (8)
- Authorization (8)
- Single Sign On (SSO) (6)
- Security Architecture (5)
- Data Security (4)
- Incident Handling and Response (4)
- Information Technology Management and Leadership (4)
- Security Awareness (4)
- Institutional Management (3)
EDUCAUSE Library Items for Firewalls
-
Information Security
-
June 14, 2013
This Spotlight focuses on data from the 2012 Core Data Service (CDS) to better understand how higher education institutions approach information security activities. Information provided …
-
Are You Paying Attention to the Character Behind the (Layer 7) Curtain?
-
January 12, 2011
|
A session at the Mid-Atlantic Regional Conference 2011
Many bad guys revised their attack methodology during 2010. Roughly 80% of attacks are now initiated through the web application layer 7 vulnerabilities, yet most higher ed Institutions allocate le…
-
RFP Template for Information Security Projects
-
November 10, 2009
This Request For Proposal template was created to help organizations identify and select a quality security vendor to perform professional services work. It also lists questions organizations sho…
-
Securing Campus Web Applications with Vulnerability Scanning and Web Application Firewalls
-
November 5, 2009
|
A session at the EDUCAUSE 2009 Annual Conference
Web application firewalls (WAFs) and penetration testing are excellent ways to secure your environment while meeting PCI-DSS requirements. This session will focus on our experience with each tool, …
-
Enhancing Application Security With a Web Application Firewall
-
February 17, 2011
UC Irvine has done extensive research in comparing the many different options short of physically testing each appliance. After meeting with each vendor, UC Irvine asked them to send a completed …
-
Web Application Firewalls at SCSU: Why and How
-
April 21, 2009
|
A session at the Security 2009
Several years ago most people didn't have any idea what a web application firewall (WAF) was or why one might be needed. We will talk about the events that brought WAFs off St. Cloud State Uni…
-
Digital Self Defense Workshops
-
January 24, 2008
The Rochester Institute of Technology provides security awareness online workshops on protecting your computer and yourself from outside online intruders, and other data security information hand…
-
Border Patrol: Access Denied!
-
October 25, 2007
|
A session at the EDUCAUSE 2007 Annual Conference
The University of Notre Dame recently changed its network border policy to deny most unsolicited network traffic from the Internet. A small set of services like the Web, secure shell, and VPN are a…
-
Open Source Security Tools at Maricopa Community Colleges
-
January 1, 2004
The Maricopa Community Colleges consist of 10 colleges, two skill centers, and many college satellite centers, including classes being held at the Arizona state prison. More than 200,000 students…
-
Force10 Networks - Is Open Source Key to High-Speed Security?
-
April 11, 2007
|
A session at the Security 2007
As network speed has increased over the past three years, security has failed to keep pace. Traditional firewalls and intrusion protection systems can't handle proprietary rule sets or increas…

















