WEBINAR: The Impact of Firewall Sprawl

CTOvision

New research with the Aberdeen Group highlights how network complexity is adding cost and increasing risk. Register >> Network firewalls have long been established as the ubiquitous first line of defense for every organization’s network security strategy. But the evolving needs of the enterprise have dramatically changed the make-up – and complexity – of network infrastructures. Better manage network configurations.

Palo Alto Networks: A Next Generation Firewall

CTOvision

Palo Alto Networks protects thousands of enterprise and governments from cyber threats. The Palo Alto Networks security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS and URL filtering. Communications Companies Company Cyber Security Hot Technologies Security Companies Cisco Systems IP address Juniper Networks Network Security Palo Alto Palo Alto California Palo Alto Network WildFire

Kicking the Tires: Verisign DNS Firewall

CTOvision

Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Our bottom line conclusion: Integration of the Verisign DNS Firewall into an existing environment couldn’t be more seamless, configuration and management are a breeze, and it delivers immediate benefit to the security posture of any environment. For more information on the DNS Firewall and other Verisign Security Services check out their website: [link].

How have network firewalls evolved?

Network World

Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over the years and what are the latest trends in firewall security

Qatar’s Milaha Maritime and Logistics upgrades firewall to ensure global network performance

Computer Weekly

Middle East marine and logistics company has improved its firewall to support global expansion

What is a firewall?

Network World

Network-based firewalls have become almost ubiquitous across US enterprises for their proven defense against an ever-increasing array of threats. A recent study by network testing firm NSS Labs found that up to 80% of US large businesses run a next-generation firewall. Research firm IDC estimates the firewall and related unified threat management market was a $7.6 What is a firewall?

Next-Gen Enterprise Network Doesn’t Stop at Corporate Firewall

Data Center Knowledge

Study: pressure on IT to create value drives demand for interconnection services Read More. Cloud Computing Colocation Connectivity Data Center Strategies Enterprise Equinix Featured

The best enterprise level firewalls: Rating 10 top products

Network World

You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall. Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.

5 open source alternatives for routing/firewall

Network World

Economical and flexible Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking.

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. These devices combined traditional L3/L4 packet filtering with deep packet inspection, IPS, and other network security services along with knowledge about users and applications. This broad functionality packaging changed the network security paradigm—everyone needed, or at least wanted a NGFW at the perimeter or within the internal network.

What to consider when deploying a next-generation firewall

Network World

Firewalls have become ubiquitous across enterprises over the past decade, but the combination of new and varied access methods combined with increasingly sophisticated attacks has forced network operators and security professionals to constantly evaluate their defenses. MORE AT NETWORK WORLD : What is a firewall? +

4 tools for managing firewall rules

Network World

Firewall devices are only as good as the hundreds, or even thousands, rules that govern them. Misconfigurations, unused rules and conflicting rules can cause firewalls to fail in their crucial missions. Firewall security management products can help security managers monitor compliance, orchestrate device policies, optimize rules and manage firewall changes.

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Since 2000, secure networks have been built by segmenting traffic at the switch port level from server to server, radically limiting east-west traffic.

Review: 5 open source alternatives for routers/firewalls

Network World

Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, like DHCP and DNS. Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.

Fight firewall sprawl with AlgoSec, Tufin, Skybox suites

Network World

New and innovative security tools seem to be emerging all the time, but the frontline defense for just about every network in operation today remains the trusty firewall. They aren’t perfect, but if configured correctly and working as intended, firewalls can do a solid job of blocking threats from entering a network, while restricting unauthorized traffic from leaving. For admins trying to configure firewall rules, the task can quickly become unmanageable.

Vendor management and looking beyond SMB firewalls, anti-virus, and data backups

IT Toolbox

I just had lunch with a long-time business colleague who specializes in IT consulting and network systems integration for small and medium-sized businesses. From servers to PBXs and everything in between, his company sells, installs, and manages entire network environments for its customers. Companies like my colleague’s are the backbone of the enormously large group of businesses

SMB 122

IDG Contributor Network: Barracuda protects industrial IoT with network-based firewall

Network World

How do IoT firewalls protect against such threats? Many industrial IoT systems have open doors that create unintended vulnerabilities. What information could be exposed by open communications protocols? How do hackers identify vulnerable systems? What security resources are available? TCP Port 502 vulnerabilities. Many industrial systems use TCP Port 502, which allows two hosts to establish a connection and exchange streams of data.

Face-off: Cisco vs. Fortinet for enterprise firewalls

Network World

Firewalls have been on the front lines of network security for 25 years. Today, two of the top enterprise firewalls are Cisco’s Adaptive Security Appliance (ASA) and Fortinet’s Fortigate, according to reviews by users in the IT Central Station community. Over time they’ve evolved beyond simple packet filtering to take on a wider and deeper variety of tasks to block modern threats.

Cisco touts next-gen firewall gear for midsize installations

Network World

Cisco is coming out with four next-generation firewall boxes aimed at giving smaller organizations protection that is better sized to their needs and engineered to minimize performance hits as additional security services are turned on. That architecture enables custom processing of traffic requiring threat inspection, and also supports tagging traffic that doesn’t need threat inspection so it flows through only the separate network processing unit.

Palo Alto Networks Uses Neural Networks to Attack Insider Threat

CTOvision

Interestingly enough, Palo Alto Networks is working on ways to help its customers leverage the high fidelity data coming out of its Enterprise Security Platform. A SOM is a type of artificial neural network that uses unsupervised learning to produce a discretized representation of its input.

What users love (and hate) about 4 leading firewall solutions

Network World

While always an integral part of a company’s security procedures, firewalls are becoming even more important as more companies move to the cloud and software defined networks. A firewall is a network security system that controls and monitors incoming and outgoing network traffic, based on preset security parameters. Firewalls create a barrier between a secure internal network and a potentially less-secure outside network.

China Is Said to Close Major Hole in its Great Internet Firewall

Data Center Knowledge

(Bloomberg) — China’s government has told telecommunications carriers to block individuals’ access to virtual private networks by Feb. 1, people familiar with the matter said, thereby shutting a major window to the global internet. Beijing has ordered state-run telecommunications firms, which. Asia-Pacific Regulation

How OPM Could Have Avoided the Data Breach

CTOvision

Knowing the interaction of firewall rules, and uncovering vulnerabilities introduced by misconfiguration, is vital. Uncovering unused, hidden, and redundant rules, which can have unforeseen impact on overall security, would help to simplify the overall firewall environment. Visualizing traffic flow can help to discover unexpected paths in and out of systems to pinpoint unexpected ingress and egress points for systems and the network.

Akanda Releases Orchestration Software for OpenStack Networks

Data Center Knowledge

The company’s orchestration software is designed to function as the centralized management layer for all OpenStack-related networking decisions, including managing routing, load balancing, firewall and more Read More. Networking

Java and Python FTP attacks can punch holes through firewalls

Network World

The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks. On Saturday, security researcher Alexander Klink disclosed an interesting attack where exploiting an XXE (XML External Entity) vulnerability in a Java application can be used to send emails.

Cisco discloses PIX firewall, IOS software security holes

Network World

More on Network World: Cisco buys into containers with Container X acquisition +. Cisco has warned of a high priority security hole in its IOS software that could have let attackers snatch memory contents from a variety of products that could lead to the disclosure of confidential information. Specifically Cisco said the vulnerability is due to “insufficient condition checks in the part of the code that handles [Internet Key Exchange] IKEv1 security negotiation requests.

How Google reinvented security and eliminated the need for firewalls

Network World

Over time, however, that perimeter developed holes as Google’s increasingly mobile workforce, scattered around the world, demanded access to the network. SAN FRANCISCO -- In some ways, Google is like every other large enterprise. It had the typical defensive security posture based on the concept that the enterprise is your castle and security involves building moats and walls to protect the perimeter.

DoS technique lets a single laptop take down an enterprise firewall

Network World

At a time when the size of distributed denial-of-service attacks has reached unprecedented levels, researchers have found a new attack technique in the wild that allows a single laptop to take down high-bandwidth enterprise firewalls. ICMP is commonly used for the ping network diagnostic utility, and attacks that try to overload a system with ping messages -- known as ping floods -- use ICMP Type 8 Code 0 packets.

Juniper Unveils New Software-Defined Secure Networks Offerings

Data Center Knowledge

New containerized SRX and virtual SRX provide enhanced firewall capabilities Read More. Shared

What is microsegmentation? How getting granular improves network security

Network World

It’s aimed at making network security more granular. Microsegmentation vs. VLANs, firewalls and ACLs. Network segmentation isn’t new. Companies have relied on firewalls , virtual local area networks (VLAN) and access control lists (ACL) for network segmentation for years. Microsegmentation is a method of creating secure zones in data centers and cloud deployments that allows companies to isolate workloads from one another and secure them individually.

Automation critical to scalable network security

Network World

Securing the business network has been and continues to be one of the top initiatives for engineers. To combat this, security professionals have deployed a number of security tools, including next-generation firewalls (NGFW) such as Cisco’s Firepower, which is one of the most widely deployed in the industry. Managing firewalls becomes increasingly difficult. And firewall rules continue to grow in number and complexity, making it nearly impossible to update them manually.

5 Things That CIOs Need To Be Doing In Order To Protect Their Networks

The Accidental Successful CIO

CIOs had better be doing all five of these network protection actions Image Credit: svenwerk. The bad guys know about the importance of information technology and so they spend their time trying to break into our networks and we keep trying to find ways to keep them out.

Embrace DBaaS to Speed Up Mobile App Development

CTOvision

Latency – First and foremost, mobile apps need to be designed for highly latent network environments. While some interactions may be over wifi, its very likely that your users will end up trying to complete some critical transaction at a time when their device is either struggling to get a cellular signal or dealing with traffic congestion on the carrier’s network. By Chip Childers.

Why CIOs May Be The Company's Biggest Security Risk (a chief information officer needs an IT strategy to create IT alignment)

The Accidental Successful CIO

Thank goodness your company has taken care to secure every way that there is for outsiders to get into your company’s network. Over the last 30 years or so, corporations have spent untold billions of dollars to create secure corporate networks.

Bayshore Networks: Cloud- and on-premises-based IoT cybersecurity technology for industrial enterprises

CTOvision

With this post we are initiating coverage of Bayshore Networks in our IoT Companies category. Traditionally used for Operational Technology (OT), this industrial equipment is being increasingly managed by IT networks, introducing a new layer of complexity. Research Team.