PRO+ Premium Content/Information Security magazine

Thank you for joining!
Access your Pro+ Content below.
March 2004

2004: Evaluating top firewalls for application-layer attack defense

About this review Learn more about the firewall evaluation criteria used for this review. Andrew Bagrin has a lot of confidence in his firewalls. "Our auditor was pen testing, looking for servers that were accessible from the outside," says Bagrin, director of business technology applications for Knoxville, Tenn.-based Regal Cinemas. "They found one that looked pretty vulnerable, so we said, 'Why don't you try to exploit it? See if you can take it down.'" The auditors threw everything they had at the server, but Bagrin's firewall -- Check Point's FW-1 NG with Application Intelligence -- blocked every attack. Not long ago, the testers might have been able to overcome firewall protection and blow that server down. But new protocols, business requirements and threats from the outside and inside are driving firewall vendors to enhance their products with highly granular application-layer controls and intrusion prevention capabilities. We looked at the newest releases from six firewall vendors -- Check Point Software Technologies, ...

Access this PRO+ Content for Free!

By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Features in this issue

Columns in this issue

  • The security improvements of Microsoft ISA Server 2004

    by  Victor R. Garza

    In an effort to bolster its security image, Microsoft is going to release its ISA Server 2004 later this year. Here you will learn about the security improvements of Microsoft ISA Server 2004.