WEBINAR: The Impact of Firewall Sprawl

CTOvision

Register >> Network firewalls have long been established as the ubiquitous first line of defense for every organization’s network security strategy. Sprawling deployments of firewalls and other security devices that increase complexity, cost and risk. Join representatives from research firm, the Aberdeen Group , as they share their insights on the rise of firewall sprawl and learn how the FireMon platform answers the call for more strategic firewall management.

Cisco security warnings include firewall holes, Nexus software weaknesses

Network World

Cisco has issued another batch of security warnings that include problems in its Firepower firewall (FXOS), Unified Computing System (UCS) software and Nexus switch operating system (NX-OS). The firewall and UCS vulnerabilities all have a severity level of “high” on the Common Vulnerability Scoring System and include: To read this article in full, please click here

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

What is a firewall?

Network World

Network-based firewalls have become almost ubiquitous across US enterprises for their proven defense against an ever-increasing array of threats. A recent study by network testing firm NSS Labs found that up to 80% of US large businesses run a next-generation firewall. Research firm IDC estimates the firewall and related unified threat management market was a $7.6 What is a firewall?

Euroclear automates firewall rule management with AlgoSec

Computer Weekly

Post-trade back-office process provider has made the management of firewalls more efficient through security management software

Machine learning in Palo Alto firewalls adds new protection for IoT, containers

Network World

Palo Alto Networks has released next-generation firewall (NGFW) software that integrates machine learning to help protect enterprise traffic to and from hybrid clouds , IoT devices and the growing numbers of remote workers. The machine learning is built into the latest version of Palo Alto's firewall operating system – PAN 10.0 – to prevent real-time signatureless attacks and to quickly identify new devices – in particular IoT products – with behavior-based identification.

VMware firewall takes aim at defending apps in data center, cloud

Network World

VMware has taken the wraps off a firewall it says protects enterprise applications and data inside data centers or clouds. Unlike perimeter firewalls that filter traffic from an unlimited number of unknown hosts, VMware says its new Service-defined Firewall gains deep visibility into the hosts and services that generate network traffic by tapping into into its NSX network management software, vSphere hypervisors and AppDefense threat-detection system.

Cisco uncorks 26 security patches for switches, firewalls

Network World

Cisco has bundled 25 security advisories that describe 26 vulnerabilities in Cisco NX-OS switch and Firepower FXOS firewall software. While the 26 alerts describe vulnerabilities that have a Security Impact Rating of “High,” most –23 – affect Cisco NX-OS software, and the remaining three involve both software packages. Also see What to consider when deploying a next generation firewall. |

5 open source alternatives for routing/firewall

Network World

Economical and flexible Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. These open source products deliver simple routing and networking features, plus they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering.

Are next-generation firewalls legacy technology?

Network World

A few years ago, next-generation firewalls (NGFWs) came out of nowhere to become a network security staple. NGFWs followed in the footsteps of earlier firewalls—physical appliances installed inline to protect private networks from the public Internet. Software is eating the world. Remember Marc Andreessen’s famous essay about the rise of software ?

4 tools for managing firewall rules

Network World

Firewall devices are only as good as the hundreds, or even thousands, rules that govern them. Misconfigurations, unused rules and conflicting rules can cause firewalls to fail in their crucial missions. Firewall security management products can help security managers monitor compliance, orchestrate device policies, optimize rules and manage firewall changes.

Palo Alto Networks: Proactively Averting Cyber Attacks

CTOvision

Their trifecta of Next Generation Firewall, Threat Intelligence and Advanced Endpoint Protection, can be the key to proactive mitigation of the cyber threat. Palo Alto Networks, Fortinet and Check Point Software: 3 Security Stocks to Watch in 2015 (thestreet.com). Architecture CTO Cyber Security Advanced Endpoint Protection Cyber Threat firewall Next Generation Firewall Palo Alto Networks Threat Intelligence By Charles Hall.

Review: 5 open source alternatives for routers/firewalls

Network World

Open source software offers an economical and flexible option for deploying basic home, SMB or even enterprise networking. Plus, they are combined with security functionality, starting with a basic firewall and possibly including antivirus, antispam and Web filtering. These open source products deliver simple routing and networking features, like DHCP and DNS.

What users love (and hate) about 4 leading firewall solutions

Network World

While always an integral part of a company’s security procedures, firewalls are becoming even more important as more companies move to the cloud and software defined networks. A firewall is a network security system that controls and monitors incoming and outgoing network traffic, based on preset security parameters. Firewalls create a barrier between a secure internal network and a potentially less-secure outside network.

Embrace DBaaS to Speed Up Mobile App Development

CTOvision

Big Data CTO Application Deployment Application Development Application Lifecycle Cloud Computing Cloud Database Cloud platform Cloud services Couchbase Couchbase DBaaS Database-as-a-Service DBaaS DBaaS inside the firewall DBaaS Platform DBaaS provider DBaaS service provider DBaaS services DBaaS Software devops Mobile Apps MongoDB MongoDB-as-a-Service On-premise DBaaS Private DBaaS By Chip Childers.

Akanda Releases Orchestration Software for OpenStack Networks

Data Center Knowledge

The company’s orchestration software is designed to function as the centralized management layer for all OpenStack-related networking decisions, including managing routing, load balancing, firewall and more Read More. Networking

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. Hardware based firewall – Filtering packets in both directions at a record rate of 250 nanoseconds, offering the fastest filter execution available on the market. Marty Meehan.

Guidance Software Federal Summit 6 March 2014

CTOvision

By Bob Gourley 2014 Guidance Software Federal Summit: Cybersecurity | E-Discovery | Enterprise Forensics. The Guidance Software Federal Summit is a thought leadership forum designed exclusively for federal managers and leaders to learn how Government and industry leaders are achieving endpoint visibility across their entire IT ecosystems.

Solarflare’s Open Compute Platform, Software-Defined, NIC Card

CTOvision

Solarflare, a global leader in networking solutions for modern data centers, is releasing an Open Compute Platform (OCP) software-defined, networking interface card, offering the industry’s most scalable, lowest latency networking solution to meet the dynamic needs of the enterprise environment. Hardware based firewall – Filtering packets in both directions at a record rate of 250 nanoseconds, offering the fastest filter execution available on the market. Marty Meehan.

Juniper Unveils New Software-Defined Secure Networks Offerings

Data Center Knowledge

New containerized SRX and virtual SRX provide enhanced firewall capabilities Read More. Shared

Attack Discovery Software for Telecom Companies

Galido

Information Technology Blog - - Attack Discovery Software for Telecom Companies - Information Technology Blog. The assessment audits and security software also help to ensure a secure connected world in an age where everyone and every device is connected. It can provide insights on how to fine-tune routing or set up a signaling firewall to block specific attacks. Ever wonder what secures 4G and 5G mobile networks from attacks?

Cisco software flaw could lead to DoS

IT Manager Daily

A recently discovered software flaw could have a major impact on your business. Threat: A vulnerability in Cisco’s FXOS and NX-OS software could leave you exposed to an attack. Multiple firewalls and fabric extenders are affected. Exploited flaw: The affected software doesn’t properly validate header values in Cisco Fabric Services packets. Fixes/Workarounds: Cisco recently released software updates to patch the vulnerability.

Cisco software flaw allows device takeover

IT Manager Daily

Cisco networking devices running adaptive security appliance (ASA) software are vulnerable to a newly discovered flaw. Threat: This software is found on networking devices that combine firewall, antivirus, intrusion prevention and virtual private network capabilities. The post Cisco software flaw allows device takeover appeared first on IT Manager Daily. Applications & Software In this week's e-newsletter Cisco IT Security software vulnerability

CIOs Need To Know Why Antivirus Software Can Create False Security

The Accidental Successful CIO

Antivirus software can help but it’s not invincible Image Credit: Gabriel Salvadó. Almost every person with the CIO job currently has some form of antivirus software deployed within their company. The thinking behind this software is that if the bad guys attach some malicious software to a document, image, or spreadsheet that comes into the company, then before anyone can open it up the antivirus software will catch it and the file will be quarantined.

Towards A Unified View Of "Software-Defined"

Chuck's Blog - EMC

In one corner of our industry, we have a familiar  discussion regarding hypervisors , or — more precisely — software-defined compute.   In another corner, we have a vigorous debate around software-defined networking.   And, closer to home, a completely separate debate around software-defined storage. Wrapping your head around software-defined anything can take some serious effort, if my personal experience is any guide. 

8 of the best free antivirus software options

Mashable Tech

For any PC user, it's important to have effective antivirus software installed. Besides protecting you against nefarious viruses and trojans, antivirus software also blocks spyware and can offer adequate protection against malware and adware. In the past, antivirus software has been known for slowing down PCs due to its need to scan extensively on a regular basis. These days though, most software hardly makes a dent on your PC's performance, while still providing protection.

5 Reasons for CIO to be Thankful for this Thanksgiving

Social, Agile and Transformation

Six years ago, I wrote a fun post on A CIO 's Top Ten Guide to Preparing a Thanksgiving Feast, where I shared some whimsical advice from building a firewall to outsourcing what you cannot do well. about me agile software development cio DevOps digital transformation future of work innovation leadership organizational change

Heimdal PRO Review

Doctor Chaos

Heimdal PRO – the security solution for everyone The Internet is not a safe place to navigate without a security software product installed on your computer. And you need more than an antivirus or a good firewall solution to keep your data safe from all kind of cyber attacks. While no software security provides 100% […].

Towards A Unified View Of "Software-Defined"

Chuck's Blog - EMC

In one corner of our industry, we have a familiar  discussion regarding hypervisors , or — more precisely — software-defined compute.   In another corner, we have a vigorous debate around software-defined networking.   And, closer to home, a completely separate debate around software-defined storage. Wrapping your head around software-defined anything can take some serious effort, if my personal experience is any guide. 

Cisco turns out security patches 25 high-threat flaws for IOS, IOS XE

Network World

If you are a security admin with lots of systems running Cisco IOS and IOS XE software today is decidedly not your day. The warnings affect firewalls, wireless access points and switches. out of 10 threat level, are multiple vulnerabilities in the Zone-Based Firewall feature of Cisco IOS XE Software that could let an remote attacker to cause the device to reload or stop forwarding traffic through the firewall ,resulting in a denial of service (DoS).

ITAM Isn’t Sexy. But We Need It!

CTOvision

When it comes to IT management software, what kid says, “Hey, do you want Tivoli Asset Management, or LANDesk IT?”. According to the International Association for IT Asset Management ( IAITAM ), ITAM is Software Asset Management (SAM), Hardware Asset Management (HAM), and Asset Portfolio Management (APM). Is ITAM accounting software? Is it inventory software? Special software (usually with agents) discovers the hardware and the software that is installed on it.

Microsegmentation – Secure Your Internal Network

CTOvision

The problem is that threat actors are able to get through the castle gates (firewalls) and once in, are able to evade the castle guards (IPS). Microsegmentation brings three important things to the table: 1) support for network virtualization; 2) support for software defined networking; and 3) automation. VMware leverages their entire NSX infrastructure and their proprietary software defined networking to make segmentation effortless. Nathaniel Crocker.

SoftwareAG Unveils New Internet of Things Solution Accelerator

CTOvision

An Essential Starter Kit for Any CIO Considering the Internet of Things or Software Companies Needing a Jumpstart. Reston, VA, May 27, 2014 – Software AG (Frankfurt TecDAX: SOW) today unveiled its Internet of Things (IoT) Solution Accelerator, a tightly-bundled set of smart tools that help business leaders gain actionable insights from different, disparate data sources in real-time enabling them to make better business decisions. About Software AG. By Bob Gourley.

3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020

CEB IT

Firewall as a service (FWaaS). FWaaS provides a more flexible and centralized way to deliver enterprise firewall features to multiple locations. FWaaS competes with secure web gateways and web application firewalls to achieve many of the same aims.

CIOs Need To Know What Robotic Process Automation (RPA) Is

The Accidental Successful CIO

You’ve probably already done the simple things such as deploying a group chat application, installing an ERP suite, and, of course, putting in countless firewalls to keep the whole operation safe. The software robots will be able to be used to replace people who are currently completing clerical tasks. CIOs believe that RPA technology can be used to replace humans with software robots that will perform their tasks quicker and more reliably. Software.

Cisco warns of two security patches that don’t work, issues 17 new ones for IOS flaws

Network World

Cisco has dropped 17 Security advisories describing 19 vulnerabilities in the software that runs most of its routers and switches, IOS and IOS/XE. Also see What to consider when deploying a next generation firewall. | The company also announced that two previously issued patches for its RV320 and RV325 Dual Gigabit WAN VPN Routers were “incomplete” and would need to be redone and reissued. Get regularly scheduled insights by signing up for Network World newsletters. ].

WAN 110

How does your SaaS vendor respond to the scalability question.

Social, Agile and Transformation

Ask some CTO’s about how their product scales and they’ll whip out a logical diagram showing you redundant networks, redundant firewalls, load balancers, clustered application servers, redundant databases, and SAN storage. If you’re lucky they’ll tell you about their software stack and then throw in a bit about their software development life cycle. How are customer specific implementations managed in their software repository? software qa. (8).

What Business Users Should Do To Mitigate DDoS Threats

CTOvision

We are strong believers in using software defined perimeter approaches to understand who is who and what is what and only allowing authorized actions in your network. Use a DNS firewall to reduce two major issues: 1) users visiting sites known to have malicious code that threatens your enterprise and 2) malicious code inside your enterprise that seeks to beacon out to its controller. We recommend Verisign's DNS Firewall. Bob Gourley.

Your Enterprise has too many Cyber-ish People

CTOvision

Cyber has been called the ultimate team sport: CIOs, CTOs, SysAdmins, Software Developers, CISOs, threat teams, red teams, testing groups, etc. Jobs like keeping software updated, tracking down holes in the firewalls, waiting for alarms to go off, being fed alerts about out-of-date software: in short lots of controlled firefighting. By John Scott.

Five Things Your Startup Has to Do, Even After Your App Is Built

Galido

Security is a big concern for mobile apps, and you’ll pay for firewalls, encryptions, and compliance,” according to BuildFire. Mobile Programming SoftwareInformation Technology Blog - - Five Things Your Startup Has to Do, Even After Your App Is Built - Information Technology Blog. It would be great if you could put in all the work to develop an app, release it, and never have to think about it again. Unfortunately, that’s definitely not the case.

IT pros need to weigh in on that ‘sassy’ security model

Network World

Both of these trends have contributed to the development by Gartner of a network architecture known as the secure-access service edge or SASE , which “converges network (for example, software-defined WAN) and network security services (such as [secure web gateways], [cloud access security brokers] and firewall as a service).” Cloud services that provide both network and security intelligence are gaining popularity because they are easy to consume and they improve agility.

WAN 76

Fed Tech Roundup September 30

CTOvision

NASA's new software could save time and fuel on flights - GCN.com. Dynamic firewall to help defend from DDoS attacks - GCN.com. The following are some of the hot topics in the federal technology ecosystem (from FedTechTicker.com and TopTechTicker.com ): Fed Tech Ticker. Northrop Grumman to Feature Maritime Security Capabilities at Pacific 2015. Audit: Federal networks still vulnerable - The Hill. Self-Driving Cars Could Save 300000 Lives Per Decade in America - Nextgov.

Product Review: Paessler PRTG Network Monitor

Galido

This network software is not only powerful but also easy to use. PRTG is network software that monitors your entire infrastructure 24 hours a day, 7 days a week, and alerts you to problems before users even realize it. The software offers a hierarchical structure of device views with options to group similar sensors. It is one of the most powerful network monitoring software you buy. Networking Software

LAN 60

Bayshore Networks: Cloud- and on-premises-based IoT cybersecurity technology for industrial enterprises

CTOvision

The company’s policy-based Information Technology/Operational Technology (IT/OT) Gateway, an alternative to next-generation firewalls in some settings, inspects and filters industrial data for customers in fields such as manufacturing, connected cars and smart cities. The Bayshore IT/OT Gateway software provides operational and security policy for Industrial Automation and Control Systems (IACS). Research Team.