article thumbnail

What is a firewall?

Network World

Network-based firewalls have become almost ubiquitous across US enterprises for their proven defense against an ever-increasing array of threats. A recent study by network testing firm NSS Labs found that up to 80% of US large businesses run a next-generation firewall. What is a firewall? billion by 2020.

Firewall 135
article thumbnail

The Total Economic Impact™ of Cisco Secure Firewall

Tech Republic Security

Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Secure Firewall. The post The Total Economic Impact™ of Cisco Secure Firewall appeared first on TechRepublic. To better understand the.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CIOs Look For Ways To Fool Hackers

The Accidental Successful CIO

Image Credit: Brian Klug Every CIO realizes that a key part of their job is to find ways to keep the bad guys out of the company’s networks. However, I think that we all have to agree that despite our best efforts there is always the possibility that the bad guys may find a way to get into our networks.

Firewall 130
article thumbnail

Next-Gen Enterprise Network Doesn’t Stop at Corporate Firewall

Data Center Knowledge

Study: pressure on IT to create value drives demand for interconnection services Read More.

Firewall 100
article thumbnail

How customers can save money during periods of economic uncertainty

CIO Business Intelligence

Today, security, networking, and IT teams are faced with reduced headcount, shrinking budgets, and the very real need to do more with less. Yesterday’s hub-and-spoke networks and castle-and-moat security models were adequate when users, applications, and data all resided onsite in the corporate office or data center.

article thumbnail

The Holiday Hacker Case Study

SecureWorld News

The Timehop engineer discovers that the database, while still password protected, is not behind a firewall and can be accessed by anyone with the password. That was nearly an extra day's worth of time for the attacker to have access to the company network. . - The Timehop engineer discovers that the password has been changed.

article thumbnail

What Local, State, Federal Governments Should Do To Mitigate DDoS Threats

CTOvision

This post provides some of our suggestions on what governments can do in this regard: Legislatures should consider how to encourage network operators to operate in secure ways. One concept would be to grade network providers like healthcare providers are graded and do so in a way that provides the public with results.