Access your Pro+ Content below.
Firewalls play by new rules
This article is part of the Information Security magazine issue of September 2013 Volume 15 / No. 7
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced, many IT security experts are still stuck with the original firewalls that handle ports and protocols. Modern enterprises need a deeper understanding of the applications that operate across their networks. Newer security appliances offer deep packet inspection, finer-grained controls and application awareness to help organizations police their network perimeters. Despite the appeal of these newer platforms, "next generation" labels can't begin to describe the range of technology, features and support issues involved when companies migrate to modern firewalls. These appliances are now offered by a host of established vendors including Check Point Software Technologies, Cisco Systems, Dell, Fortinet, Juniper Networks, Palo Alto Networks, Sourcefire (acquired by Cisco in July), Stonesoft (acquired by McAfee in May) and WatchGuard. F5 Networks entered the fray in 2012, when its Big IP product ...
Access this PRO+ Content for Free!
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Features in this issue
Modern firewalls offer greater application awareness and user controls. Protect your migration strategy with these tips from the pros.
This month's special online multimedia supplement to Information Security magazine details the advanced new features of next-generation firewalls and how to make the most of them.
While poaching security talent may plug short-term gaps, outreach and education will solve the long-term shortfall in IT security professionals.
Global risk management based on the lowest common denominator may not ‘comply' with IP or trade secrets. Analysts see big changes ahead.
Columns in this issue
Analysts expect security concerns to drive global risk management, but executives may need convincing.
Not down with Dropbox? Lee Heath embraced shadow IT and improved his company's data security practices in the process.
Forget the slogans. Reset your security awareness program with actionable information.