Access "Understanding the value of an enterprise application-aware firewall"
This article is part of the October 2011 Vol. 2, No. 5 issue of Adopting an application-centric architecture
Firewalls have been the predominant form of security for Internet-connected networks for some 25 years now. While the technology remained largely unchanged for much of that time, more recently a new generation of "application-aware" firewalls has emerged to deal with today's application-centric threats. More on application security SANS Top 25 programming errors: Application security best practices Netsparker: Free Web application security testing tool Black Hat 2010 podcast: Mobile application security threats During this last quarter century, attackers have moved from targeting operating systems to targeting the applications that run on them, moving up the protocol stack to use protocols such as HTTP and XML to launch sophisticated attacks. These attacks are designed to circumvent the traditional access control policies enforced by perimeter firewalls. In turn, firewalls have added more functionality to be able to operate on all layers of the protocol stack, from layer 2 to layer 7, inspecting traffic and analyzing protocols to thwart the latest attack ... Access >>>
Premium Content for Free.
Understanding the value of an enterprise application-aware firewall
by Michael Cobb, Application Security
Today's enterprise application-aware firewall technology offers a host of features to manage application and Web 2.0 traffic. Expert Michael Cobb takes a look at the features and how to make the most of them.
Where is the real session-based application-aware routing?
Application-aware traffic management technology that exists today just doesn't cut it. This Fast Packet blogger would like to see session-based application-aware routing that provides visibility of session state, application behavior and bandwidth use.
- Understanding the value of an enterprise application-aware firewall by Michael Cobb, Application Security
Can your security strategy handle networked facilities management?
by Andreas Antonopoulos, Contributor
Linking building and power management systems to converged Ethernet networks brings new security concerns.
Network application performance monitoring: Storage to the user
by John Burke, Contributor
Application performance monitoring tools must provide visibility to everything from storage I/O to remote end-user access and a whole lot in between. Here’s what your monitoring tools should show.
- Can your security strategy handle networked facilities management? by Andreas Antonopoulos, Contributor
More Premium Content Accessible For Free
The average person carries three mobile devices, according to an informal poll conducted last year by Sophos Labs. While Kindles and Fitbits probably...
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...
Whenever users complain about an application being slow, the network is always first to be blamed. And yet network engineers often have limited ...