Picking the best firewall software, hardware or application
A comprehensive collection of articles, videos and more, hand-picked by our editors
Virtual firewalls are a way to maximize your security dollar by consolidating multiple logical firewalls onto a...
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
single hardware platform. In Cisco Systems Inc. parlance, they're known as security contexts.
From a security perspective, they're a fine way to save a few bucks, as long as you purchase a product from a reliable vendor and configure it properly. Each virtual firewall has its own rulebase, interfaces and configuration options that make it completely independent from other virtual firewalls running on the same device. The independence of virtual firewalls means that a configuration mistake on one device won't affect the performance of other virtual firewalls.
One additional word of warning: If you're planning to use virtual firewalls, be sure to purchase highly redundant hardware. You don't want a single device failure taking down all of your firewalls!
If you have the complex network infrastructure that would benefit from multiple firewalls, virtual firewalls/security contexts are a great way to go!
For more information:
- What firewall controls should be placed on a VPN? Read more.
- Do virtual machines offer increased security protection? Find out more in this expert response.
Related Q&A from Mike Chapple
Cloud compliance issues are no reason for enterprises not to move to the cloud. Expert Mike Chapple explains why, as well as what to keep in mind ...continue reading
The GAO reported on SEC cybersecurity weaknesses, even though the SEC regulates cybersecurity. Expert Mike Chapple discusses the effects of this ...continue reading
Enterprise compliance can be a burden to manage, which is where a PCI ISA can be helpful. Expert Mike Chapple explains how a PCI Internal Security ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.