What is a firewall?

Network World

Network-based firewalls have become almost ubiquitous across US enterprises for their proven defense against an ever-increasing array of threats. A recent study by network testing firm NSS Labs found that up to 80% of US large businesses run a next-generation firewall. Research firm IDC estimates the firewall and related unified threat management market was a $7.6 What is a firewall?

Kicking the Tires: Verisign DNS Firewall

CTOvision

Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Our bottom line conclusion: Integration of the Verisign DNS Firewall into an existing environment couldn’t be more seamless, configuration and management are a breeze, and it delivers immediate benefit to the security posture of any environment. For more information on the DNS Firewall and other Verisign Security Services check out their website: [link].

5 open source alternatives for routing/firewall

Network World

These open source products deliver simple routing and networking features, plus they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.

Review: 5 open source alternatives for routers/firewalls

Network World

Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering. These products can be downloaded and deployed on your own hardware, on a virtual platform, or in the cloud. Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, like DHCP and DNS.

A Flicker Of Light: A new security stack points the path to safety

CTOvision

Before connectivity is provisioned, the hardware identity and software hashes from the user’s device are checked. Conceptually the new security stack is a hardware-based virtual enclave. Junaid Islam. The last few years have been a difficult time for those who protect data.

Technology Short Take #84

Scott Lowe

Servers/Hardware. Here’s an interesting article on the role that virtualization is playing in the network functions virtualization (NFV) space now that ARM hardware is growing increasingly powerful. Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Welcome to Technology Short Take #84! This episode is a bit late (sorry about that!),

IPv6 40

Technology Short Take #33

Scott Lowe

This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. First up, Jason goes off on a rant about network virtualization , briefly hitting topics like the relationship between overlays and hardware, the role of hardware in network virtualization, the changing roles of data center professionals, and whether overlays are the next logical step in the evolution of the network. Servers/Hardware. App Firewall?

The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

The concept or the traditional concept of protecting at the perimeter with the traditional firewalls and gateways is really non-existent anymore. When I'm using my laptop at a coffee shop, I am no longer going through a firewall to access a cloud service.

Intel 182

ATMs Are IT Too!

Cloud Musings

These more sophisticated systems, requiring updates, patches, and support in real-time, along with software and hardware that can operate nimbly in an agnostic ecosystem. These teams must now deal with multi-vendor hardware, software, security, and services.

IBM 151

Technology Short Take #70

Scott Lowe

In this post you’ll find a collection of links to articles discussing the major data center technologies—networking, hardware, security, cloud computing, applications, virtualization…you name it! (If Thinking of using a hardware VTEP (VXLAN Tunnel Endpoint) with VMware NSX? Servers/Hardware. VMware recently announced Open Hardware Management Services (OHMS) , a project intended to help manage servers and switches in a software-defined data center (SDDC) context.

eBook 40

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Solarflare adapters are deployed in a wide range of use cases, including software-defined networking (SDN), network functions virtualization (NFV), web content optimization, DNS acceleration, web firewalls, load balancing, NoSQL databases, caching tiers (Memcached), web proxies, video streaming and storage networks. Other capabilities include: Hardware Based Packet Telemetry. Hardware Based Security (ServerLock). Marty Meehan.

Technology Short Take #32

Scott Lowe

Ranga Maddipudi ( @vCloudNetSec on Twitter) has put together two blog posts on vCloud Networking and Security’s App Firewall ( part 1 and part 2 ). These two posts are detailed, hands-on, step-by-step guides to using the vCNS App firewall—good stuff if you aren’t familiar with the product or haven’t had the opportunity to really use it. Servers/Hardware.

HP 68

Technology Short Take #79

Scott Lowe

Tony Sangha took PowerNSX (a set of PowerShell cmdlets for interacting with NSX) and created a tool to help document the NSX Distributed Firewall configuration. Servers/Hardware. Networking Hardware Security Storage Virtualization Terraform PowerCLI NSX VMware Linux AWS Kubernetes CLI OpenStack Docker VirtualBox Microsoft Windows HyperV vSphere CareerWelcome to Technology Short Take #79! There’s lots of interesting links for you this time around. Networking.

Technology Short Take #77

Scott Lowe

Servers/Hardware. Vivek Gite over at nixCraft explains how to use ufw (Uncomplicated Firewall) on Ubuntu to limit SSH connections. Networking Hardware Security Storage Virtualization NSX VMware OVN OpenStack Macintosh vSphere Linux CLI Microsoft SSH Docker VirtualBox SSLWelcome to Technology Short Take #77. I’ve got a new collection of links and articles from around the Web on various data center-focused technologies. Networking.

IPv6 40

Technology Short Take #71

Scott Lowe

Dmitri Kalintsev is back with another article in a series of articles on using hardware VXLAN tunnel endpoints (VTEPs) with VMware NSX. Servers/Hardware. The use of VMware NSX for microsegmentation is a really popular use case, and so the topic of scripting distributed firewall (DFW) rules often comes up. Networking Hardware Security Storage Virtualization NSX VXLAN Intel Windows Microsoft HyperV OpenStack Ansible Docker Linux CoreOS RedHat VMware

Technology Short Take #46

Scott Lowe

Servers/Hardware. While all the attention is “up the stack,” there are still some occasions when you need to worry about the details in the hardware. you’ll need to be sure to unblock WMI in the Windows Firewall. Linux Networking Security Storage Virtualization Docker Hardware NSX OpenStack VMware Welcome to Technology Short Take #46.

Technology Short Take #68

Scott Lowe

If you like geeking out over the hardware side of networking, you may find this Ars Technica article on the physical infrastructure of the global Internet to be an interesting read. (I Servers/Hardware. In the event you accidentally locked yourself out of vCenter using NSX’s distributed firewall, this post by Roie Ben Haim provides a workaround for getting yourself out of this pickle.

Technology and Travel

Scott Lowe

You might also consider enabling the built-in firewall (see this write-up for enabling pf on OS X Mountain Lion ; haven’t tried on Mavericks yet) for an added layer of network protection. Macintosh Security Hardware Cody Bunch recently posted a quick round-up of what he carries when traveling, and just for fun I thought I’d do the same. Like Cody, I don’t know that I would consider myself a road warrior, but I have traveled a pretty fair amount.

Memcached servers can be hijacked for massive DDoS attacks

Network World

Also read: Getting the most out of your next-generation firewall. It is a combination of open-source software and standard server hardware that consists of memory, memory, and more memory. A flaw in the implementation of the UDP protocol for Memcached servers can allow anyone to launch a massive Distributed Denial of Service (DDoS) attack with little effort. The problem was first discovered by security researchers at content delivery network (CDN) specialist Cloudflare.

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Solarflare adapters are deployed in a wide range of use cases, including software-defined networking (SDN), network functions virtualization (NFV), web content optimization, DNS acceleration, web firewalls, load balancing, NoSQL databases, caching tiers (Memcached), web proxies, video streaming and storage networks. Other capabilities include: Hardware Based Packet Telemetry. Hardware Based Security (ServerLock). Marty Meehan.

Technology Short Take #66

Scott Lowe

Servers/Hardware. In the event you’re interested in an idea of how much latency the use of in-kernel hypervisor firewalling (such as that offered by VMware NSX) adds, have a look at this article by Sean Howard. Networking Hardware Security Storage Virtualization NSX VMware AWS Docker OpenStack Linux Windows EMC AnsibleWelcome to Technology Short Take #66! In this post you’ll find a collection of links to articles about the major data center technologies.

Technology Short Take #63

Scott Lowe

Servers/Hardware. Russell Pope at Kovarus recently wrote about using security groups to manage the VMware NSX distributed firewall. Networking Hardware Security Storage Virtualization Linux OpenStack OVS Microsoft NSX Docker VMware vSphereWelcome to Technology Short Take #63. I’ve managed to (mostly) get back to my Friday publishing schedule, though I’m running much later in the day this time around than usual. I’ll try to correct that for the next one.

Technology Short Take #33

Scott Lowe

This post by Ranga Maddipudi shows you how to use App Firewall in conjunction with VXLAN logical networks. First up, Jason goes off on a rant about network virtualization , briefly hitting topics like the relationship between overlays and hardware, the role of hardware in network virtualization, the changing roles of data center professionals, and whether overlays are the next logical step in the evolution of the network. Servers/Hardware. App Firewall?

Lenovo patches two high severity flaws in PC support tool

Network World

Lenovo Solution Center (LSC) allows users to check their system's virus and firewall status, update their Lenovo software, perform backups, check battery health, get registration and warranty information and run hardware tests. Lenovo has fixed two high-severity vulnerabilities in the Lenovo Solution Center support tool that is preinstalled on many laptop and desktop PCs. The flaws could allow attackers to take over computers and terminate antivirus processes.

SeanDaniel.com [tech]: Introducing a new line of Network Storage.

Sean Daniel

Only yesterday, a third product that I worked on over the past little while called Windows Storage Server 2008 R2 Essentials was announced, on hardware provided by Western Digital. The WD Sentinel DX4000 looks pretty awesome from a hardware perspective as well. SeanDaniel.com [tech].

SMB 59

Fountainhead: The End of the Laptop-Centric World?

Fountainhead

She shares these folders with her co-workers as well as client contacts within each company (and who are behind each clients firewall) as interactive project-based workspaces. Fast-forward: We have Margo with an office full of client-provided hardware. skip to main | skip to sidebar.

ITAM Isn’t Sexy. But We Need It!

CTOvision

According to the International Association for IT Asset Management ( IAITAM ), ITAM is Software Asset Management (SAM), Hardware Asset Management (HAM), and Asset Portfolio Management (APM). Special software (usually with agents) discovers the hardware and the software that is installed on it.

How Can CIOs Teach Their Employees About Cybersecurity?

The Accidental Successful CIO

However, no matter how many firewalls we put in place or how effectively we implement two-factor authentication we still need to understand the weakest link in our security system: our employees.

Why I Love The Oracle Cloud Strategy

Chuck's Blog - EMC

And, finally, Oracle has figured out how to bring subsets of the public Oracle Cloud into the data center, behind your firewall. We use the term "engineered systems" to describe our full-stack integration of hardware and software.

Oracle 202

May Intro | Roadmap to Securing Your Infrastructure

Linux Academy

As many of you know, most firewalls today come with a default rule set permitting all outbound traffic to flow freely. You put the firewall in place, and traffic flows outbound unimpeded. This year number five is is Secure configurations for hardware and software on devices , and number 11 is Secure configuration for network devices. Can you believe it’s already May? Spring is here, flowers are in bloom, and the grill is fired up. I really enjoy springtime.

AWS’s Shared Responsibility Model at a Glance

Perficient - Digital Transformation

Generally speaking, AWS manages the security and compliance of its infrastructure, including the hardware and software that run AWS services in the cloud. Network and firewall. Firewall (virtual private cloud).

How Open Hybrid Clouds Will Change Cloud Computing

CTOvision

Simplifies infrastructure, enabling IT to avoiding having to create new silos, which often consist of new technologies and firewalls. Today’s enterprise infrastructure is a complex web of hardware, programs, applications, and flash storage. Rick Delgado. The cloud has evolved quickly. Businesses have weighed the perks of private, public, and even hybrid clouds. If those options weren’t enough, here comes the open hybrid cloud.

Cloud 159

Towards A Unified View Of "Software-Defined"

Chuck's Blog - EMC

The “killer app” that drove server virtualization was consolidation: cramming more work onto physical hardware. of network segments, each with its own need for a firewall and rule set. firewalls), the more useful ones will be composed of storage and compute services underneath.

Enhance Your Security Posture: Doing Four Things Can Reduce Unauthorized Penetrations by 85%

CTOvision

Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. href="[link] Control 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches. href="[link] Control 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches.

PCI Compliance and Network Segmentation

Galido

Hardware and software components that make up the CDE include network devices, applications, and computing devices. This may involve forcing the use of strong passwords, limiting access to the networks by configuring the SSID to be hidden, setting up secure virtual firewalls, and so on.

LAN 52