article thumbnail

Cisco firewall upgrade boosts visibility into encrypted traffic

Network World

The software that runs Cisco’s new Firewall 4200 Series now includes the ability to see into encrypted traffic without decrypting it, which the vendor says will allow enterprise customers to better protect hybrid and multicloud applications. version of the Secure Firewall operating system.

Firewall 169
article thumbnail

Zyxel firewalls affected by two new security flaws, patches must be installed asap

TechSpot

The latest security advisory issued by Zyxel is warning customers about multiple buffer overflow vulnerabilities discovered in several of the company's firewall and VPN devices. The Taiwan-based manufacturer says that the two flaws can be potentially abused by attackers to execute malicious code or breach through vulnerable networks.

Firewall 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Palo Alto Networks: A Next Generation Firewall

CTOvision

The Palo Alto Networks security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS and URL filtering. Because these functions are natively-built into the platform and share imp. To read more please log in.

Firewall 258
article thumbnail

Cracking the Hackers: How to Build a 100% Engaged Human Firewall

Tech Republic Security

Cyber criminals have an easier entry into the company network. Doubling down and ensuring 100% effectiveness of your human firewall has never been more important. The post Cracking the Hackers: How to Build a 100% Engaged Human Firewall appeared first on TechRepublic. Home connections are less secure. Employees are distracted.

article thumbnail

The best enterprise level firewalls: Rating 10 top products

Network World

You know you need to protect your company from unauthorized or unwanted access. You need a firewall. Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.

Firewall 114
article thumbnail

Perimeter 81 launches new Firewall-as-a-Service offering

Tech Republic Security

The network defense provider joins a growing list of companies offering cloud-based firewalls.

article thumbnail

Improve supply chain security with intelligence

CTOvision

Read Tyler Logtenberg explain how companies can improve their supply chain security through threat intelligence from surface, deep and dark web on Security Intelligence : It would be comforting if the only cyber-risks organizations had to worry about were the ones that smacked up against their firewall and endpoint security solutions.

Security 392