Premium Content

Access "Next-generation firewalls play by new rules"

Issue Overview

Information Security magazine - September 2013 Volume 15 / No. 7

Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with fine-tuned application awareness and better controls, many IT managers are still stuck with the original firewalls that handle ports and protocols. The September cover story looks at the key developments that define the next-generation of these products from application awareness to domain-reputation-management, intrusion prevention techniques, and protecting virtual machines. IT security managers who have recently migrated to next-generation firewalls explain what platforms they are buying and why. We also cover innovative ways to bridge the security skills gap in a tight market, and global risk assessment beyond regulations, as analysts predict investments in security will finally lead spending in years to come.  Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Firewalls play by new rules by David Strom, Contributor

      Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros.

    • Bridging the IT security skills gap by Robert Lemos

      While poaching security talent may plug short-term gaps, outreach and education will solve the long-term shortfall in IT security professionals.

More Premium Content Accessible For Free

  • Strategies for a successful data protection program
    data_protection_2014.png
    E-Handbook

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies...

  • Devices, data and how enterprise mobile management reconciles the two
    ISM_supp_1014.png
    E-Zine

    The bring your own device (BYOD) movement, which has flooded the enterprise with employee-owned smartphones, tablets, phablets and purse-sized ...

  • Putting security on auto-pilot: What works, what doesn't
    security_auto-pilot.png
    E-Handbook

    For so long penetration testing meant hiring an expert to use skill and savvy to try to infiltrate the company system. But, as with most ...