Access "Product review: Palo Alto Networks PA-4050"
This article is part of the March 2008 issue of Reviews of six top Web application firewalls
NETWORK FIREWALL PA-4050 REVIEWED BY PHORAM MEHTA Palo Alto Networks Price: $60,000 Firewall vendors have tried to keep up with the ever changing Internet-landscape, adding functionality to the core firewall engine that enables enterprises to obtain intelligence on network traffic beyond the IP address and ports used. But, no firewall has been able to achieve all that without the help of other tools and technologies,from packet sniffers to IDS/IPS to proxy servers. Palo Alto Networks, founded by world-renowned firewall authority Nir Zuk, just might have found the answer in the PA-4050 appliance, running a hardened Linux OS and powered by Intel Xeon processors to deliver up to 10 Gbps of firewall throughput. Unlike traditional firewalls that identify applications only by protocol and port number, Palo Alto's next-generation firewall uses packet inspection and a library of application signatures to distinguish between applications that use same protocols and ports, and to identify potentially malicious apps that use nonstandard ports. Beyond application ... Access >>>
Premium Content for Free.
Case Study: Company deploys full disk encryption policy on laptops
One billion-dollar company isn't taking chances with data stored on its laptops. It deployed full disk encryption on every machine, an increasingly popular security strategy.
SonicWALL NSA E5500 product review
Product review of SonicWALL NSA E5500 security tool basic and advanced firewall features, setup, pricing, VPN and wireless security.
Novell's Sentinel 6.0 product review
In this product review of Novell's Sentinel 6.0, an addition to the SIEM market, learn about cost, setup, OS support, configuration and management.
Klocwork Insight Tool Dynamically Tests Security of Applications
Klocwork Insight tool sandbox technology allows developers to test code and security of applications while remaining insulated from the rest of the code.
- Viewpoint: War analogies tread a fine line
- Case Study: Company deploys full disk encryption policy on laptops
Security Services: TraceSecurity Risk Manager
At Your Service
Product review: Palo Alto Networks PA-4050
Imperva SecureSphere Database Gateway product review
Imperva's SecureSphere Database Gateway is evaluated for its installation and configuration, management and monitoring, vulnerability assessment and reporting capabilities.
Security Learning its Role in E-Discovery
Security teams are learning their crucial role in processing e-discovery requests.
Comparative Product Review: Six Web Application Firewalls
No longer can security managers focus only on perimeter and host security. The application has become the prime target for hackers. We review six leading Web application firewalls from Barracuda, Bee Ware, Breach Security, Citrix, F5 and Imperva that help deliver your critical apps securely.
- Security Services: TraceSecurity Risk Manager
Face-Off: Is Security Market Consolidation a Plague or Progress
Bruce Schneier and Marcus Ranum debate the impact of market consolidation on information security.
Interview with Macbook Hacker Dino Dai Zovi
PING: Dino Dai Zovi
E-Discovery Compliance Requires Security Pros to Think As Lawyers Do
Perspectives: Think Like a Lawyer
Researcher Puts Quantitative Measurement on Information Security Threats
Editor's Desk: Score One for Threats
- Face-Off: Is Security Market Consolidation a Plague or Progress
More Premium Content Accessible For Free
FTP gets big files to colleagues and clients fast, but as the headlines remind us, the threat of electronic break-ins is real. This guide to secure ...
As tablets and smartphones become more integrated into business environments, CISOs are scrambling to put effective countermeasures in place. But too...
This Technical Guide examines the necessary elements of, and how to implement, a sound mobile device management strategy. Devices will be lost...