Email Alerts
-
Next-gen firewall vs. UTM device: Which is better for Web 2.0 risks?
How does a next-gen firewall differ from a UTM device, and how does each stack up against Web 2.0 risks? Answer
-
How to set up SFTP automation for FTP/DMZ transfer
Transferring files from a DMZ to an internal FTP server can be risky. In this expert response, Anand Sastry explains how to use SFTP automation to lock it down. Answer
-
Security/virtualization concerns: Where to place a firewall connection
Is it worthwhile to place signature-based blocking technology before a firewall connection? Learn more in this expert response from Anand Sastry. Ask the Expert
-
Managing remote workers: Musts for setting up a secure home network
Is it the enterprise's responsibility to ensure that remote workers' home networks are secure? And, if so, how should they do it? Get expert advice from Nick Lewis. Ask the Expert
-
What is the difference between static and dynamic network validation?
Network data analysis is essential to understanding the security configuration of your network. But what is the difference between static data validation and dynamic data validation? Find out in this expert response. Ask the Expert
-
How to implement virtual firewalls in a complex network infrastructure
If your enterprise has a complex network infrastructure, it might be necessary to implement virtual firewalls or multiple security contexts. Network security expert Mike Chapple explains the pros and cons of doing so. Ask the Expert
-
How to manage network bandwidth with distributed ISP bandwidth
As enterprises grow, demand for bandwidth can increase exponentially. In this expert answer, Mike Chapple explains different techniques for managing network bandwidth with ISP distribution. Ask the Expert
-
What are the disadvantages of proxy-based firewalls?
Network security expert Mike Chapple explains why he strongly recommends the use of proxy-based firewalls. Ask the Expert
-
Should enterprises be running multiple firewalls?
While there may be scenarios where a single firewall is an appropriate architecture for an organization, it's equally true that many environments may benefit from the use of more than one network device Ask the Expert
-
Comparing an application proxy firewall and a gateway server firewall
There are many types of firewalls in use in today's enterprises, so it's easy to get confused about the functions of each. In this expert response, learn the difference between a proxy server firewall and a gateway server firewall. Ask the Expert
Security Management Strategies for the CIO