Email Alerts
-
Unlock new pathways to network security architecture
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of applications at an all-time high; security teams are looking at new and different ways to isolate, moni... E-Zine
-
Screen test: App-layer controls beef up perimeter firewalls
Information Security magazine looked at the newest releases from six firewall vendors -- Check Point Software Technologies, NetScreen Technologies1, CyberGuard, Symantec, Secure Computing and WatchGuard Technologies -- to gauge the capabilitie... E-Zine
-
Defense-in-Depth: Securing the network from the perimeter to the core
Enterprise networks are no longer a "crunchy shell around a soft, chewy center" and hence network defenses must be deployed inside the perimeter. But are network security vendors capable securing the network from the inside out? Also: Andrew Briney's... E-Zine
-
Next-generation firewalls: Quiz on must-have NGFW features
Test your knowledge of Joel Snyder's course on evaluating, deploying and managing next-generation firewalls in this five-question quiz. Quiz
-
Quiz: Next-generation firewalls - breaking through the hype
Test your knowledge of this Security School lesson on next-generation firewalls for the enterprise featuring expert John Burke. Quiz
-
Firewall security best practices: Get firewall network security advice
Get to know your firewall inside and out with this compilation of resources on firewall vulnerabilities, configuration and more. Learning Guide
-
NAC security guide: How to achieve secure network access in the enterprise
This multi-part network access control (NAC) security guide covers a variety of NAC-related topics, offering tips and expert advice on how to thoroughly secure network access to the enterprise. Learning Guide
-
SearchSecurity.com's top clicks of 2005
SearchSecurity.com's top five tips, news articles and learning tools from 2005. Top clicks of 2005
-
Playing with fire(walls)
Find out how well you know your firewall. Quiz
-
Lesson/Domain 5 -- Security School: Training for CISSP Certification
Security School webcasts are focused on CISSP training. This lesson corresponds to the telecommunications and networking domain in the CISSP exam's "Common Body of Knowledge." School
-
Securing Cisco routers
Read Chapter 3, Securing Cisco Routers, from the book "CCSP Secur Exam 2" written by Raman Sud and Ken Edelman. Book Chapter
-
Getting Started with the Cisco PIX Firewall
Download Chapter 6, Getting Started with the Cisco PIX Firewall, from CCSP Cisco Secure PIX Firewall Advanced Exam Certification Guide. Book Chapter
-
Top challenges facing defense-in-depth firewall technology
Defense-in-depth firewall technology may offer value, but there are six barriers thwarting firewall technology on the port level. Feature
- See more Essential Knowledge on Network Firewalls, Routers and Switches
-
Cisco security strategy: Q&A with CTO Bret Hartman
Cisco security CTO Bret Hartman explains how software and SDN are shaping Cisco's security strategy. Q&A | 17 Jul 2013
-
Certain Cisco IOS, IOS XE devices susceptible to brute-force attacks
Cisco has issued a security advisory after Hashcat researchers disclosed a password flaw in IOS and IOS XE devices that enable brute-force attacks. News | 20 Mar 2013
-
Survey: Firewall rules sprawl makes firewall policy management a mess
Bloated firewall rules are making security unmanageable and audits a nightmare, according to a survey by firewall management vendor Athena. News | 11 Jul 2012
-
HP warns of malware in HP ProCurve switches flash cards
HP has notified customers that some ProCurve 5400 zl switches were shipped that contained compact flash cards infected with malware. News | 16 Apr 2012
-
Thoma Bravo sells next-gen firewall, UTM vendor SonicWall to Dell
Dell’s security portfolio expands with purchase of unified threat management and next generation firewall vendor SonicWall from private equity firm. News | 13 Mar 2012
-
RSA 2012 talk to offer help understanding IPv6 security issues
Understanding IPv6 security issues can be a challenge, but the protocol's co-inventor says enterprises can no longer afford to ignore IPv6 security concerns. News | 22 Feb 2012
-
Black Hat 2011: Dan Kaminsky reveals network security research topics
Noted researcher Dan Kaminsky presented his latest network security research topics, including vulnerabilities in P2P networks, UPNP and home routers. News | 03 Aug 2011
-
Researchers uncover Cisco firewall vulnerabilities, McAfee console flaws
While the vendors have released patches, SecureWorks researchers told Black Hat 2010 attendees that many enterprises place too much trust in their security systems and fail to check them for basic vulnerabilities. Article | 28 Jul 2010
-
Oracle buys database firewall vendor Secerno
Oracle said the deal adds the Secerno database activity monitoring functionality to its line of database server security technologies. Article | 20 May 2010
-
For enterprise firewalls, performance outweighs security functionality
Some network administrators fear too many security features can cause bottlenecks, slowing the network or worse, shutting it down altogether. Article | 04 May 2010
- See more News on Network Firewalls, Routers and Switches
-
No firewall? How disabling the firewall can improve network security
Having no perimeter firewall may seem ludicrous, but Joel Snyder explains why disabling the firewall can actually improve enterprise network security. Tip
-
Software-defined networking: Exploring SDN security pros and cons
Matthew Pascucci offers an intro to software-defined networking and explains why SDN security relies on securing the SDN controller at all costs. Tip
-
Firewall vs. IPS: Will next-generation firewalls nix stand-alone IPS?
News analysis: Will the evolution of next-generation firewalls eliminate the stand-alone IPS market? Sean Martin discusses firewalls vs. IPS. Tip
-
How to test a firewall: A three-step guide for testing firewalls
There are three steps when testing firewalls for your organization. Expert Joel Snyder explains how to test a firewall. Tip
-
Continuous monitoring strategy for government security managers
A security expert offers insights and advice for government security managers on implementing a continuous monitoring strategy. Tip
-
Firewall deployment scenarios for new types of security threats
Is the firewall still an effective defense against new types of security threats? Network security expert Anand Sastry offers up contemporary firewall deployment scenarios for improving security. Tip
-
How to plan a secure network by practicing defense-in-depth
When designing an enterprise network that includes hosted infrastructure components, many different layers must work together to keep it secure. Learn how to build network security in by practicing defense in depth. Tip
-
Firewall logging: Telling valid traffic from network 'allows' threats
While tracking firewall "deny" actions is a good way to identify threats, logging the "allow" actions can give greater insight into malicious traffic that could be both more subtle and more dangerous. Tip
-
How to use hping to craft packets
A packet crafting tool that's been around for a long time, hping can be used to test if ports are open, as well as for firewall testing. Learn how to use hping in this tutorial. Tip
-
How to properly implement firewall egress filtering
Deploying outbound rules on a firewall is easier said than done. Scott Floyd reviews how to block outbound network traffic while avoiding mistakes that may lead to business process interruptions. Tip
- See more Tips on Network Firewalls, Routers and Switches
-
How to plan for and mitigate a Barracuda vulnerability
Learn how to lock down a back-door vulnerability on Barracuda security devices and prevent attackers from accessing management accounts. Answer
-
How to mitigate Cisco wireless denial-of-service vulnerabilities
Cisco WLAN controllers have faced several denial-of-service flaws. Learn how to reduce network security risk in cases when patches aren't available. Answer
-
Updating firewall policies with the frequency of firewall testing
Should firewall testing frequency be decided and documented when updating firewall policies? Expert Brad Casey discusses how often to test firewalls. Answer
-
Is multivendor firewall management software a viable option?
Matthew Pascucci discusses the limitations of using firewall management software to manage multivendor firewalls. Answer
-
Can SDN technology be used for network access protection?
Expert Matthew Pascucci discusses the possible security implications of using software-defined networking for network access protection. Answer
-
Huawei router security: Is there legitimate cause for concern?
Security expert Matthew Pascucci discusses Huawei router security and offers four tips for evaluating the security of enterprise network equipment. Answer
-
Choosing a switch: Should you splurge on enterprise Ethernet switches?
Matt Pascucci discusses what to look for when choosing an Ethernet switch, and whether or not to splurge on enterprise Ethernet switches. Answer
-
UTM devices: Efficient security or a firewall failure risk?
UTM devices provide more protection than a simple firewall, but do they increase the risk of an enterprise firewall failure? Answer
-
Firewall network security: Thwarting sophisticated attacks
Firewall network security is still a critical part of securing an enterprise. Learn what sophisticated attacks a firewall can effectively prevent. Answer
-
Next-generation firewalls: Marketing hype or real value?
Next-gen firewalls have some features that can be of value to large enterprises, particularly visualization and improved levels of granular control. Answer
- See more Expert Advice on Network Firewalls, Routers and Switches
-
egress filtering
Egress filtering is a process in which outbound data is monitored or restricted, usually by means of a firewall that blocks packets that fail to meet certain security requirements. Definition
-
SDN controller (software-defined networking controller)
An SDN controller is an application in software-defined networking (SDN) that manages flow control to enable intelligent networking. SDN controllers are based on protocols, such as OpenFlow, that allow servers to tell switches where to send packets. Definition
-
screened subnet (triple-homed firewall)
A screened subnet (also known as a 'triple-homed firewall') is a network architecture that uses a single
firewall with three network interfaces... (Continued) Definition -
firewall
A firewall is a set of related programs, located at a network gateway server, that protects the resources of a private network from users from other networks. Definition
-
bastion host
On the Internet, a bastion host is the only host computer that a company allows to be addressed directly from the public network and that is designed to screen the rest of its network from security exposure. Definition
-
virus
In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document. Definition
-
Firewall Builder (Fwbuilder)
Firewall Builder, also called Fwbuilder, is a vendor-neutral configuration and management application for firewalls that is intended primarily for Linux and that supports the OpenBSD Packet Filter, Cisco PIX Series security devices, iptables, and ipf... Definition
-
Next-generation firewalls: Top five myths and misconceptions about firewalls
In this podcast, Joel Snyder dispels the top five myths, misconceptions and lies about firewalls. Podcast
-
Evaluating next-generation firewalls
In this presentation, Joel Snyder discusses best practices for evaluating next-generation firewalls. Video
-
Cisco: Integration key to enterprise security strategy
Cisco's Chris Young says the vendor's enterprise security strategy, including the next-generation data center and SDN, hinges on Cisco's integration efforts. Video
-
How to use Wireshark to detect and prevent ARP spoofing
Video: Keith Barker of CBT Nuggets demonstrates how to use Wireshark, the popular open source packet analyzer, to prevent ARP spoofing attacks. Screencast
-
pfSense tutorial: Configure pfSense as an SMB-caliber firewall
Video: Keith Barker of CBT Nuggets provides a brief pfSense tutorial. Learn how to configure pfSense, a free yet surprisingly capable firewall. Screencast
-
VeriSign on DNSSEC support
Joe Waldron, a product manager in VeriSign's Naming (DNS) Group, said engineers are testing and upgrading systems to support security extensions for DNS (DNSSEC). Video
-
PCI compliance requirement 1: Firewalls
PCI experts Diana Kelley and Ed Moyle review Requirement 1 of the Payment Card Industry Data Security Standard, which includes a mandate for stateful inspection firewalls. Video
-
Enterprise endpoint security fundamentals
Video: Mike Chapple offers a "back to basics" look at enterprise endpoint security to identify the crucial components of an endpoint security program. Video
-
Unlock new pathways to network security architecture
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of applications at an all-time high; security teams are looking at new and different ways to isolate, moni... E-Zine
-
Cisco security strategy: Q&A with CTO Bret Hartman
Cisco security CTO Bret Hartman explains how software and SDN are shaping Cisco's security strategy. Q&A
-
How to plan for and mitigate a Barracuda vulnerability
Learn how to lock down a back-door vulnerability on Barracuda security devices and prevent attackers from accessing management accounts. Answer
-
How to mitigate Cisco wireless denial-of-service vulnerabilities
Cisco WLAN controllers have faced several denial-of-service flaws. Learn how to reduce network security risk in cases when patches aren't available. Answer
-
Next-generation firewalls: Top five myths and misconceptions about firewalls
In this podcast, Joel Snyder dispels the top five myths, misconceptions and lies about firewalls. Podcast
-
Evaluating next-generation firewalls
In this presentation, Joel Snyder discusses best practices for evaluating next-generation firewalls. Video
-
No firewall? How disabling the firewall can improve network security
Having no perimeter firewall may seem ludicrous, but Joel Snyder explains why disabling the firewall can actually improve enterprise network security. Tip
-
Next-generation firewalls: Quiz on must-have NGFW features
Test your knowledge of Joel Snyder's course on evaluating, deploying and managing next-generation firewalls in this five-question quiz. Quiz
-
Updating firewall policies with the frequency of firewall testing
Should firewall testing frequency be decided and documented when updating firewall policies? Expert Brad Casey discusses how often to test firewalls. Answer
-
Is multivendor firewall management software a viable option?
Matthew Pascucci discusses the limitations of using firewall management software to manage multivendor firewalls. Answer
- See more All on Network Firewalls, Routers and Switches
About Network Firewalls, Routers and Switches
Learn how to choose a firewall, where to place it, how to tackle configuration, vulnerabilities and threats, and monitor traffic between secured and unsecured environments. Get advice on how to manage and secure routers and switches.
Security Management Strategies for the CIO