Firewall Feud Lunch & Learn


FireMon is surveying security pros across the country about their biggest challenges with firewall policy management. Join FireMon in a city near you as their experts reveal the top answers and share firewall management best practices for tackling them head on! Why Running Multiple WordPress Firewalls is a Bad Idea ( Technology › Apple hack exposes flaws in building apps behind 'Great Firewall' (

7 Critical Firewall Capabilities to Prevent Cyberattacks


Read Russ Schafer list seven critical firewall capabilities to prevent cyber attacks on Dark Reading : Firewall technology used to be simple and straightforward. You programmed it with predefined security policies set by your organization.


Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

WEBINAR: The Impact of Firewall Sprawl


Register >> Network firewalls have long been established as the ubiquitous first line of defense for every organization’s network security strategy. Sprawling deployments of firewalls and other security devices that increase complexity, cost and risk. Security teams and business leaders alike need to understand the impacts of sprawl and how a strategic solution delivering visibility, intelligence and automation can help organizations: Overcome complexity.

Palo Alto Networks debuts cloud-native firewall service for AWS

Venture Beast

Palo Alto Networks has unveiled a new cloud-native firewall service for Amazon Web Services (AWS), aiming to simplify cloud network security. Read More.

How to install the CSF firewall on Ubuntu Server

Tech Republic Security

If you'd like a powerful firewall for your Ubuntu Server, but one that offers a fairly straightforward configuration, Jack Wallen thinks CSF might be the right tool for the job

Kicking the Tires: Verisign DNS Firewall


Cognitio has been evaluating the new Verisign DNS Firewall along with its Recursive DNS service for the last several weeks. Our bottom line conclusion: Integration of the Verisign DNS Firewall into an existing environment couldn’t be more seamless, configuration and management are a breeze, and it delivers immediate benefit to the security posture of any environment. For more information on the DNS Firewall and other Verisign Security Services check out their website: [link].

Cloudflare introduces SD-WAN- and firewall-as-a-service offerings

Tech Republic Security

In a bid to replace MPLS circuits and SD-WAN appliances, Cloudflare has introduced Magic WAN and Magic Firewall and partnerships with VMware, Aruba, Digital Realty, CoreSite and EdgeConneX

In A Multi-Cloud World, Web Application Firewalls Still Matter

Forrester Digital Transformation

If you hadn’t thought about web application firewalls (WAFs) in a while, you might think they were an anachronism, a tool of the past that modern application environments don’t bother with. Age of the Customer Application Security Cloud Security Cybersecurity security risk management

Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All

Tech Republic Security

Firewalls have been an integral part of the enterprise network architecture. But with the shift to digital business models the once-sturdy firewall has gone from a security staple to a security risk. Read more to learn the five major risks brought on by legacy firewalls in a world of cloud and mobile. The post Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All appeared first on TechRepublic.

Palo Alto Networks: A Next Generation Firewall


They rely on a deep expertise and commitment to innovation to continually enhance their game-changing security platform. The Palo Alto Networks security platform natively brings together all key network security functions, including advanced threat protection, firewall, IDS/IPS and URL filtering. Palo Alto Networks protects thousands of enterprise and governments from cyber threats.

2021 Gartner® Magic Quadrant™ for Network Firewalls

Tech Republic Data Center

Fortinet is named a Leader in the Gartner® 2021 Magic Quadrant™ for Network Firewalls and recognized for the 12th time in this Magic Quadrant™ FortiGate Network Firewalls deliver enterprise security to any edge at any scale. With FortiGate Next-Generation Firewalls you can: Protect: Avoid breaches and business disruptions by minimizing ransomware and other cyberattacks with. The post 2021 Gartner® Magic Quadrant™ for Network Firewalls appeared first on TechRepublic.

2022 Gartner® Critical Capabilities for Network Firewalls

Tech Republic Data Center

Fortinet ranked #1 in the Enterprise Data Center, Distributed Enterprise, and SMB use cases as of 30 November 2021 The January 2022 Gartner® Critical Capabilities report for Network Firewalls includes network firewall evaluations for various use cases. The post 2022 Gartner® Critical Capabilities for Network Firewalls appeared first on TechRepublic. Data Centers Digital Transformation Networking Security

Cybersecurity has 53 unicorns. Here are 10 to watch

Venture Beast

Here's a look at 10 unicorn startups in cloud, app and identity security. Cybersecurity now has 53 companies with billion-dollar valuations. Read More.

An Exposed Username and Password Leaves Over 100,000 Zyxel Firewalls and VPN Gateways Open to Severe Attacks

GizModo VR

A critical vulnerability discovered by a Dutch security specialist at EYE allows hackers to “completely compromise the confidentiality, integrity and availability” of more than 100,000 Zyxel firewalls, VPN gateways, and access point controllers. security zyxel firewalls vpns hacks

Cisco security warnings include firewall holes, Nexus software weaknesses

Network World

Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS), Unified Computing System (UCS) software and Nexus switch operating system (NX-OS).

Which firewall security management solution is best for your needs?

IT Toolbox

Which firewall security management solution is best for your needs? IT Central Station is a crowdsourced enterprise tech reviews

Euroclear automates firewall rule management with AlgoSec

Computer Weekly

Post-trade back-office process provider has made the management of firewalls more efficient through security management software

Cisco issues firewall, SD-WAN security warnings

Network World

Amongst Cisco’s dump of 27 security advisories today only one was rated as critical – a vulnerability in its Firepower firewall system that could let an attacker bypass authentication and execute arbitrary actions with administrative privileges on a particular device.

Perimeter 81 launches new Firewall-as-a-Service offering

Tech Republic Security

The network defense provider joins a growing list of companies offering cloud-based firewalls

Improve supply chain security with intelligence


Read Tyler Logtenberg explain how companies can improve their supply chain security through threat intelligence from surface, deep and dark web on Security Intelligence : It would be comforting if the only cyber-risks organizations had to worry about were the ones that smacked up against their firewall and endpoint security solutions.

How organizations are misusing firewalls (and what IT teams should do about it)

Tech Republic Security

Firewall management doesn't mean set it and forget it. Learn tips for effective firewall configuration to protect your organization from security risks and threats

FW4: The Fourth Generation Of Firewalls

Forrester's Customer Insights

Not to be morbid, but the COVID-19 pandemic has come at a perilous time for the enterprise firewall vendors that rely heavily on selling big iron (and that’s most of them).

Hacked Florida Water Plant Reportedly Had No Firewall and Poor Password Security

GizModo VR

targeted by a hacker in a horrifying cyberattack last week is said to have exhibited very weak IT security practices. Recent updates from government authorities claim the facility did not have some basic network protections—including a firewall. The water plant in Oldsmar, Fla.

Palo Alto launches cloud-native firewall service for AWS

Network World

Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says

IT pros admit to frustration with firewalls

Tech Republic Data Center

The difficulties with firewalls range from budgeting to deployment to making rule changes, according to a new report from security segmentation firm Illumio

5 ways to create a secure firewall

Tech Republic Security

Firewall management can be a complicated and risky process if not performed carefully. Here are five tips to help you build a successful strategy

The Web Application Firewall Market Is Ripe For Disruption

Forrester's Customer Insights

Let’s face it: Web Application Firewalls (WAFs) rarely excite the security imagination. age of the customer application security cybersecurity security & risk security architecture API security web application firewalls

Cosentry Takes Managed Security Services Beyond Firewall

Data Center Knowledge

Cosentry Security Services Midwest managed services provider beefs up portfolio of offerings following two data center acquisitions this year Read More.

Azure Storage Account Networking: When to Use Firewalls and Service Endpoints

Linux Academy

Recently, when building content for one of my upcoming courses, Microsoft Azure Architect Technologies – Exam AZ-300 , I found the Microsoft documentation wasn’t immediately clear on the exclusivity of Storage Account Firewalls, and Service Endpoints. Do I need to use Service Endpoints and the Storage Firewall together? When configuring Storage Account Firewalls, we don’t have to configure a Service Endpoint. Storage Account Firewalls.

Cisco uncorks 26 security patches for switches, firewalls

Network World

Cisco has bundled 25 security advisories that describe 26 vulnerabilities in Cisco NX-OS switch and Firepower FXOS firewall software. While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve both software packages. Also see What to consider when deploying a next generation firewall. |

How have network firewalls evolved?

Network World

Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over the years and what are the latest trends in firewall security

Why firewalls are not recommended for securing SCADA systems

Tech Republic Security

SCADA systems need to be secure, yet according to one expert, firewalls are not up to the task, and should be replaced with Unidirectional Security Gateways. Learn what to look for in a USG

To secure industrial IoT, use segmentation instead of firewalls

Network World

The internet of things (IoT) has been top of mind for network and security professionals for the better part of the past five years. While there are many advantages to merging IT and OT and having IIoT fall under IT ownership, it has a profound impact on the cybersecurity team because it introduces several new security threats. This has been particularly true for the area of industrial IoT (IIoT).

Zero trust network access should be on every CISO’s SASE roadmap

Venture Beast

SASE solutions close network cybersecurity gaps so enterprises can secure and simplify access to resources from any location. Read More.

How firewall automation can help prevent breaches caused by wrong configurations

Tech Republic Security

A majority of IT staffers polled by firewall management service FireMon said they still use manual processes to manage changes

GreyNoise launches free tool to protect against ‘scary’ vulnerabilities like Log4j

Venture Beast

GreyNoise launched a free security tool to guard against critical vulnerabilities that are being widely exploited, such as the flaw in Log4j. Read More.

5 firewall features IT pros should know about but probably don’t

Network World

Firewalls continuously evolve to remain a staple of network security by incorporating functionality of standalone devices, embracing network-architecture changes, and integrating outside data sources to add intelligence to the decisions they make – a daunting wealth of possibilities that is difficult to keep track of.

The best enterprise level firewalls: Rating 10 top products

Network World

You need a network-security tool that examines the flow of packets in and out of the enterprise, governed by rules that decide whether that flow is safe, malicious or questionable and in need of inspection. You need a firewall. Recognizing that you need a firewall is the first – and most obvious -- step. The next crucial step in the decision-making process is determining which firewall features and policies best-suit your company’s needs.

What to consider when deploying a next-generation firewall

Network World

Firewalls have become ubiquitous across enterprises over the past decade, but the combination of new and varied access methods combined with increasingly sophisticated attacks has forced network operators and security professionals to constantly evaluate their defenses. MORE AT NETWORK WORLD : What is a firewall? +

Palo Alto Networks: Proactively Averting Cyber Attacks


It''s important to utilize every form of security to get closer to proactive prevention. Their trifecta of Next Generation Firewall, Threat Intelligence and Advanced Endpoint Protection, can be the key to proactive mitigation of the cyber threat. Palo Alto Networks, Fortinet and Check Point Software: 3 Security Stocks to Watch in 2015 ( By Charles Hall. Cyber threats are becoming more advanced, persistent, and focused.

How to install Config Server Firewall on CentOS 7

Tech Republic Security

Although the default firewall in CentOS is powerful, there's a more flexible option available. Jack Wallen walks you through the steps for installing Config Server Firewall

The role of next-gen firewalls in an evolving security architecture

Network World

As the commercial enterprise firewall approaches its 30th birthday, it is hard to overstate how dramatically the product has evolved. This 2,700-word research report looks the current state of next-generation firewall technology

Autodesk Leverages Adaptive Cloud Security

Tech Republic Security

Autodesk needed scalable and secure cloud security to build new applications and extend internal data centers. Fortinet’s Adaptive Cloud Security enabled Autodesk to implement a scalable, secure VPC model that would both satisfy the north-south firewall requirement and facilitate minimal latency for east-west (inter-VPC) traffic. The post Autodesk Leverages Adaptive Cloud Security appeared first on TechRepublic. Cloud Security