Access "NGFW: Getting clarity on next-gen firewall features"
This article is part of the March 2012 issue of Exploring the benefits of enhanced SIEM products
Firewalls are arguably the “granddaddy” technology of the current IT security world. In the late 1980s, the earliest firewalls were little more than filtering rule sets on routers. As more organizations connected to the Internet in the early to mid-90s, the demand for firewalls evolved and companies like DEC, Raptor and TIS introduced commercial products. These early firewalls monitored connections for what were, at the time, the most popular application-layer protocols: FTP, Gopher, SMTP (email), and Telnet. Around the mid-90s, something interesting happened to the firewall market. A massive debate erupted around which technology implementation was more secure for network perimeter firewalls: Stateful protocol filtering (sometimes referred to a multilayer stateful inspection or “MLSI”) or application proxy gateways? While stateful inspection firewalls checked source IP, destination IP and port, application proxy firewalls were privy to the entire transaction and could be configured with more granular, context-based rules to examine types of activities ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
-
NGFW: Getting clarity on next-gen firewall features
by Diana Kelley
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
-
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
-
-
The RSA breach: One year later
by Marcia Savage, Michael S. Mimoso and Robert Westervelt
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
-
Symantec breach highlights remote management holes
by Robert Westervelt, News Director
Poorly configured remote administration tools are a common attack vector, security experts say.
-
The RSA breach: One year later
by Marcia Savage, Michael S. Mimoso and Robert Westervelt
-
Columns
-
A framework for big data security
by John Kindervag, Contributor
Organizations are entranced with big data but need to acknowledge the security risks and plan accordingly.
-
Lessons learned from VeriSign, Symantec breaches
by Marcia Savage, Editor
After a string of breaches at major security vendors, whom can we trust?
-
A framework for big data security
by John Kindervag, Contributor
More Premium Content Accessible For Free
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Emerging threat detection techniques and products
E-Handbook
Advanced persistent threat (APT) has been a used and abused term in the security industry, but security experts say targeted attacks are a growing ...
The rapid evolution of MDM solutions
E-Zine
Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. BYOD policies, and the ...
Security Management Strategies for the CIO