Access "NGFW: Getting clarity on next-gen firewall features"
This article is part of the March 2012 issue of Exploring the benefits of enhanced SIEM products
Firewalls are arguably the “granddaddy” technology of the current IT security world. In the late 1980s, the earliest firewalls were little more than filtering rule sets on routers. As more organizations connected to the Internet in the early to mid-90s, the demand for firewalls evolved and companies like DEC, Raptor and TIS introduced commercial products. These early firewalls monitored connections for what were, at the time, the most popular application-layer protocols: FTP, Gopher, SMTP (email), and Telnet. Around the mid-90s, something interesting happened to the firewall market. A massive debate erupted around which technology implementation was more secure for network perimeter firewalls: Stateful protocol filtering (sometimes referred to a multilayer stateful inspection or “MLSI”) or application proxy gateways? While stateful inspection firewalls checked source IP, destination IP and port, application proxy firewalls were privy to the entire transaction and could be configured with more granular, context-based rules to examine types of activities ... Access >>>
Premium Content for Free.
Unlocking the opportunity of SIEM technology
by Andrew Hutchison
Learn about SIEM technology and how to unlock the opportunity for SIEM technology to be a powerful technique in the fight against cybercrime.
NGFW: Getting clarity on next-gen firewall features
by Diana Kelley
There’s a lot of hype about next-generation firewalls. Here’s what you need to know.
- Unlocking the opportunity of SIEM technology by Andrew Hutchison
The RSA breach: One year later
by Marcia Savage, Michael S. Mimoso and Robert Westervelt
The attack on RSA shook the security industry to its core: A look at the breach’s far reaching impact.
Symantec breach highlights remote management holes
by Robert Westervelt, News Director
Poorly configured remote administration tools are a common attack vector, security experts say.
- The RSA breach: One year later by Marcia Savage, Michael S. Mimoso and Robert Westervelt
A framework for big data security
by John Kindervag, Contributor
Organizations are entranced with big data but need to acknowledge the security risks and plan accordingly.
Lessons learned from VeriSign, Symantec breaches
by Marcia Savage
After a string of breaches at major security vendors, whom can we trust?
- A framework for big data security by John Kindervag, Contributor
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...