Enterprise Firewalls: The Security Tech That Keeps On Ticking
Forrester IT
DECEMBER 20, 2022
Last month, Carlos Rivera and I published The Forrester Wave™: Enterprise Firewalls, Q4 2022, featuring our analysis of 10 firewall vendors.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Forrester IT
DECEMBER 20, 2022
Last month, Carlos Rivera and I published The Forrester Wave™: Enterprise Firewalls, Q4 2022, featuring our analysis of 10 firewall vendors.
Network World
JUNE 29, 2023
The software that runs Cisco’s new Firewall 4200 Series now includes the ability to see into encrypted traffic without decrypting it, which the vendor says will allow enterprise customers to better protect hybrid and multicloud applications. version of the Secure Firewall operating system.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Network World
NOVEMBER 16, 2022
Palo Alto Networks has released next-generation firewall (NGFW) software that includes some 50 new features aimed at helping enterprise organizations battle zero-day threats and advanced malware attacks. The new features are built into the latest version of Palo Alto's firewall operating system – PAN 11.0
Network World
AUGUST 3, 2023
Fortinet has added new features to its SD-WAN software and a next-generation firewall series that promise to help customers better monitor and protect distributed enterprise resources.
Network World
JUNE 17, 2020
Palo Alto Networks has released next-generation firewall (NGFW) software that integrates machine learning to help protect enterprise traffic to and from hybrid clouds , IoT devices and the growing numbers of remote workers.
Network World
OCTOBER 11, 2017
Network-based firewalls have become almost ubiquitous across US enterprises for their proven defense against an ever-increasing array of threats. A recent study by network testing firm NSS Labs found that up to 80% of US large businesses run a next-generation firewall. What is a firewall? billion by 2020. billion by 2020.
Network World
MAY 5, 2022
Multiple vulnerabilities have been discovered in Cisco's Enterprise NFV Infrastructure Software (NFVIS). NFVIS is Linux-based infrastructure software designed to help enterprises and service providers to deploy virtualized network functions, such as a virtual router, firewall and WAN acceleration, Cisco stated.
Network World
MARCH 8, 2019
VMware has taken the wraps off a firewall it says protects enterprise applications and data inside data centers or clouds. To read this article in full, please click here
Network World
APRIL 4, 2022
Fortinet has made available a new release of its core FortiOS software that includes features the vendor says will help enterprises more tightly meld security and networking controls. FortiOS 7.2, FortiOS is the vendor’s operating system for the FortiGate family of hardware and virtual components.
CTOvision
OCTOBER 15, 2015
Register >> Network firewalls have long been established as the ubiquitous first line of defense for every organization’s network security strategy. But the evolving needs of the enterprise have dramatically changed the make-up – and complexity – of network infrastructures. The result? Register here. Related articles.
Tech Republic Security
AUGUST 10, 2022
Doubling down and ensuring 100% effectiveness of your human firewall has never been more important. The post Cracking the Hackers: How to Build a 100% Engaged Human Firewall appeared first on TechRepublic. Cyber criminals have an easier entry into the company network.
CTOvision
DECEMBER 17, 2014
Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. It seems more like a jobs program that moves headcount from one part of the enterprise to the expensive nerdy-side. etc, but really should it be? So: constrain funding!
CIO Business Intelligence
AUGUST 30, 2023
Now, generative AI use has infiltrated the enterprise with tools and platforms like OpenAI’s ChatGPT / DALL-E, Anthropic’s Claude.ai, Stable Diffusion, and others in ways both expected and unexpected. Employees are using it to develop software, write code, create content, and prepare sales and marketing plans. Here’s what I learned.
Network World
SEPTEMBER 21, 2023
Looking to significantly reinforce its security software portfolio, Cisco has struck a $28 billion cash deal to acquire enterprise and cloud protection company Splunk. Founded in 2003, Splunk’s software platform is known for its wide-reaching ability to search, monitor and analyze data from a variety of systems.
Computerworld Vertical IT
OCTOBER 3, 2023
Devices were kept in offices, shared the same network, and were protected by antivirus software, firewalls, and software updates. Once upon a time, digital business sat inside the security perimeter. With mobility, this changed.
ComputerWorld IT Management
OCTOBER 3, 2023
Devices were kept in offices, shared the same network, and were protected by antivirus software, firewalls, and software updates. Once upon a time, digital business sat inside the security perimeter. With mobility, this changed.
CTOvision
MAY 16, 2017
Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. Hardware Based Security (ServerLock).
Network World
JULY 25, 2023
A group of industry stalwarts is banding together to help enterprises, services providers and telcos fight cyber foes. Its aim is to deliver open and collaborative techniques to help improve the security of network hardware and software across the industry. To read this article in full, please click here
Network World
JUNE 7, 2023
Cisco said it was looking meld the network and security intelligence it has amassed over the years with the large language models (LLMs) of generative AI to simplify enterprise operations and address threats with practical, effective techniques.
CTOvision
MAY 9, 2017
Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. Hardware Based Security (ServerLock).
Network World
APRIL 25, 2016
While always an integral part of a company’s security procedures, firewalls are becoming even more important as more companies move to the cloud and software defined networks. A firewall is a network security system that controls and monitors incoming and outgoing network traffic, based on preset security parameters.
Network World
NOVEMBER 12, 2021
Nvidia has announced a Zero Trust platform built around its BlueField data-processing units and Nvidia software. You cannot just rely on the firewall on the outside, you have to assume that any application or any user inside your data center is a bad actor,” said Manuvir Das, head of enterprise computing at Nvidia.
Network World
SEPTEMBER 12, 2016
Economical and flexible Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. We found that ClearOS, pfSense, and Untangle could be appropriate for home use all the way up to the enterprise environment.
Network World
SEPTEMBER 12, 2016
Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.
CTOvision
FEBRUARY 20, 2014
By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. Government. Registration is free for Government attendees. Register Now! Space is Limited. To Register visit: [link].
CTOvision
AUGUST 20, 2016
The company’s policy-based Information Technology/Operational Technology (IT/OT) Gateway, an alternative to next-generation firewalls in some settings, inspects and filters industrial data for customers in fields such as manufacturing, connected cars and smart cities.
CIO Business Intelligence
MARCH 19, 2024
We overhauled our software portfolio, our go-to-market approach and the overall organizational structure. We’ve changed how and through whom we will sell our software. Many major brands and Fortune 500 companies run their mission-critical workloads on VMware software. Please stay tuned. There’s much more to come.
Network World
DECEMBER 5, 2016
Behavior analytics is one of the more recent buzzwords in enterprise cybersecurity, with more than 35 vendors competing for customers, according to security analysts. Behavior analytics in cybersecurity is roughly defined as using software tools to detect patterns of data transmissions in a network that are out of the norm.
CTOvision
OCTOBER 24, 2016
We are strong believers in using software defined perimeter approaches to understand who is who and what is what and only allowing authorized actions in your network. We recommend Verisign's DNS Firewall. It provides cloud-based network security based on is built on Verisign's global recursive DNS platform.
CTOvision
OCTOBER 27, 2014
Palo Alto unveils latest release of virtual firewall series. Enterprise security company, Palo Alto Networks has announced the latest release of its virtual firewall series (VM-Series). Upgrades of enterprise Hadoop-based distributions from two of the top three vendors — Cloudera Inc. and Hortonworks Inc.
CTOvision
APRIL 4, 2016
Firewalls and security software can identify known threats, but attack techniques are constantly evolving and mutating. Cray's Urika-GD ™ Platform Solution enables real-time discovery of cyberattacks and helps enterprises gain key insights by discovering relationships in big data.
CIO Business Intelligence
MARCH 7, 2024
In my recent column, I delved into the challenges enterprises face in integrating AI into the workplace and outlined strategies for CISOs to monitor or control the use of AI effectively. Firewall capability for AI security: Enhance security measures by providing firewall capabilities to safeguard against potential AI-related vulnerabilities.
CIO Business Intelligence
APRIL 27, 2022
However, employees working outside the corporate firewall and other network protections pose some big security challenges, especially for large enterprises. CIOs and CSOs still have to ensure that employees outside of the corporate firewall can do their work securely. IT admins cannot secure assets that they can’t see.
CTOvision
FEBRUARY 4, 2014
By Bob Gourley We often highlight the importance of applying security controls to your enterprise. Inventory of Authorized and Unauthorized Software. href="[link] Control 2: Inventory of Authorized and Unauthorized Software. Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers.
CIO Business Intelligence
MARCH 20, 2024
The Burgeoning Complexity of IT and Security Solutions On a business level, complexity comes from growth through acquisition – when enterprises inherit systems of record and of work that, more often than not, are different from one another. The road other is paved with disciplined IT and business governance. Password strategies. Encryption.
CIO Business Intelligence
JANUARY 24, 2024
Use the AI that comes with the applications you already have Business and enterprise software providers like Adobe, Salesforce, Microsoft, Autodesk, and SAP are integrating multiple types of AI into their applications. Open-source communities and companies like Dell and Intel are here to help you weave AI throughout your enterprise.
ForAllSecure
FEBRUARY 15, 2023
Some organizations have begun using Web Application Firewalls (WAFs) to protect their APIs, but this isn’t a true solution to API security. APIs are used internally as well, allowing servers in an enterprise to rapidly share important data. What do APIs do? The sensitive data shared via APIs makes API security vital.
Tech Republic
OCTOBER 11, 2022
The work-from-anywhere (WFA) model presents security risks, so it’s critical for organizations to provide enterprise-level security everywhere they work, whether at home, in the office, or on the road. In addition to the next-generation firewall (NGFW).
Venture Beast
FEBRUARY 15, 2022
F5 launched its Distributed Cloud Services platform with application security features such as API protection and web application firewall. Read More.
Network World
JUNE 4, 2018
Enterprises that have grown comfortable with Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (IaaS) are increasingly accepting of Network as a Service (NaaS). NaaS is a rapidly growing market. To read this article in full, please click here
CIO Business Intelligence
JANUARY 6, 2023
But 86% of technology managers also said that it’s challenging to find skilled professionals in software and applications development, technology process automation, and cloud architecture and operations. Of those surveyed, 56% said they planned to hire for new roles in the coming year and 39% said they planned to hire for vacated roles.
SecureWorld News
APRIL 27, 2021
If you secretly add malicious code to a legitimate software update, then organizations might welcome all the code into their networks. A similar type of attack just played out against an Enterprise Password Management tool called Passwordstate. SolarWinds may have been a proof-of-concept of how effective a supply chain attack can be.
CTOvision
AUGUST 25, 2014
As enterprises work to rapidly embrace the mobile revolution, both for their workforce and to engage more deeply with their customers, the pressure is on for IT to support the tools needed by their application developers. There’s no denying the massive growth in mobile applications within the enterprise. By Chip Childers.
CIO Business Intelligence
JANUARY 4, 2024
The CCA allows overarching enterprise functions and IT shared services to be assessed separately from the business unit’s products/applications that require PCI security compliance. In fact, the scope of the CCA is the aggregation of the various IT and non-IT patterns that the enterprise uses in scope for PCI.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content