Premium Content

Access "Firewalls play by new rules"

Published: 29 Aug 2013

Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced, many IT security experts are still stuck with the original firewalls that handle ports and protocols. Modern enterprises need a deeper understanding of the applications that operate across their networks. Newer security appliances offer deep packet inspection, finer-grained controls and application awareness to help organizations police their network perimeters. Despite the appeal of these newer platforms, "next generation" labels can't begin to describe the range of technology, features and support issues involved when companies migrate to modern firewalls. These appliances are now offered by a host of established vendors including Check Point Software Technologies, Cisco Systems, Dell, Fortinet, Juniper Networks, Palo Alto Networks, Sourcefire (acquired by Cisco in July), Stonesoft (acquired by McAfee in May) and WatchGuard. F5 Networks entered the fray in 2012, when its Big IP product line of application delivery ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Firewalls play by new rules by David Strom, Contributor

      Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros.

    • Bridging the IT security skills gap by Robert Lemos

      While poaching security talent may plug short-term gaps, outreach and education will solve the long-term shortfall in IT security professionals.

More Premium Content Accessible For Free

  • Does Windows 8.1 meet the demands of the BYOD age?
    windows_shopping_8-1.png
    E-Handbook

    The variety and sheer number of network endpoints, users and devices in the enterprise today is driving IT's demands for enhanced security features ...

  • Application security policy after Heartbleed
    ISM_0914.png
    E-Zine

    Enterprises leverage open source software for the perceived quality of the code, but the Heartbleed flaw has made many question their use of ...

  • Devising a security strategy for the modern network
    countering_cybercrime.png
    E-Handbook

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update ...