by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : November and December 2014
54 RSA SecurID ® Authentication Manager Convenient and cost-effective, two-factor authentication solution CDW 799449 CALL FOR PRICING • Lowers the total cost of ownership • Delivers flexibility and convenience of a new risk-based authentication • Maximizes the potential of your virtual environment • Prepares for advanced threats that many organizations are facing today Cisco ® ASA 5515-X IPS Edition — Security Appliance You need a firewall that provides the performance you need at a price you can afford, without compromising security CDW 2644507 $ 5749.58 • The Cisco ® ASA 5515-X is midrange security appliance that uses Cisco SecureX Architecture ® for a context-aware approach to security that delivers multiple security services, multigigabit performance, flexible interface options and redundant power supplies • Built on the same security platform as the rest of the ASA family of security appliances, and has been designed to deliver exceptional performance for operational efficiency Smartphone not included CDWG.com/cisco CDWG.com/rsasecurity FireEye ® NX 1400 Threat prevention platforms that combat web-based cyberattacks CDW 3277619 CALL FOR PRICING The FireEye ® platform protects against blended, advanced attacks that use web, spear-phishing emails and zero-day exploits. Organizations get real-time protection against malicious URLs and the ability to connect the dots of a blended attack. • Deploys in-line (block/monitor mode) or out-of-band (TCP reset mode/monitor mode) • Analyzes all suspicious web objects including PDFs, flash, multimedia formats and ZIP/RAR/TNEF archives as well as blocks outbound malware to thwart data exfiltration • Streamlines incident response prioritization with AV-Suite integration 54-55ab GSO145298.indd 1 9/23/14 1:05 PM