Access your Pro+ Content below.
NGFW: Getting clarity on next-gen firewall features
This article is part of the March 2012 issue of Information Security magazine
Firewalls are arguably the “granddaddy” technology of the current IT security world. In the late 1980s, the earliest firewalls were little more than filtering rule sets on routers. As more organizations connected to the Internet in the early to mid-90s, the demand for firewalls evolved and companies like DEC, Raptor and TIS introduced commercial products. These early firewalls monitored connections for what were, at the time, the most popular application-layer protocols: FTP, Gopher, SMTP (email), and Telnet. Around the mid-90s, something interesting happened to the firewall market. A massive debate erupted around which technology implementation was more secure for network perimeter firewalls: Stateful protocol filtering (sometimes referred to a multilayer stateful inspection or “MLSI”) or application proxy gateways? While stateful inspection firewalls checked source IP, destination IP and port, application proxy firewalls were privy to the entire transaction and could be configured with more granular, context-based rules to ...
Access this Pro+ Content for Free!
Features in this issue
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
Poorly configured remote administration tools are a common attack vector, security experts say.