Access "NGFW: Getting clarity on next-gen firewall features"
This article is part of the March 2012 issue of Exploring the benefits of enhanced SIEM products
Firewalls are arguably the “granddaddy” technology of the current IT security world. In the late 1980s, the earliest firewalls were little more than filtering rule sets on routers. As more organizations connected to the Internet in the early to mid-90s, the demand for firewalls evolved and companies like DEC, Raptor and TIS introduced commercial products. These early firewalls monitored connections for what were, at the time, the most popular application-layer protocols: FTP, Gopher, SMTP (email), and Telnet. Around the mid-90s, something interesting happened to the firewall market. A massive debate erupted around which technology implementation was more secure for network perimeter firewalls: Stateful protocol filtering (sometimes referred to a multilayer stateful inspection or “MLSI”) or application proxy gateways? While stateful inspection firewalls checked source IP, destination IP and port, application proxy firewalls were privy to the entire transaction and could be configured with more granular, context-based rules to examine types of activities ... Access >>>
Premium Content for Free.
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
NGFW: Getting clarity on next-gen firewall features
by Diana Kelley
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
- Unlocking the opportunity of SIEM technology by Andrew Hutchison
The RSA breach: One year later
by Marcia Savage
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
Symantec breach highlights remote management holes
by Robert Westervelt
Poorly configured remote administration tools are a common attack vector, security experts say.
- The RSA breach: One year later by Marcia Savage
A framework for big data security
by John Kindervag, Contributor
Organizations are entranced with big data but need to acknowledge the security risks and plan accordingly.
Lessons learned from VeriSign, Symantec breaches
by Marcia Savage
After a string of breaches at major security vendors, whom can we trust?
- A framework for big data security by John Kindervag, Contributor
More Premium Content Accessible For Free
As more security professionals take on greater roles in global risk management, Global 2000 companies are investing in cybersecurity measures above ...
All indications show that DDoS attacks are increasing in variety, number and size. No network system is immune and information security pros can't ...
The Fast Identity Online (FIDO) standards reached the public draft stage in February, and the first deployments of FIDO-ready technologies followed ...