firewall
Integrated content-aware SIEM and firewall
NitroSecurity and Palo Alto Networks have integrated content-aware SIEM and next-generation firewall technology into a complete enterprise security solution designed to …
Cisco Firewalls
There used to be a time when firewalls were considered a full proof solution for protecting networks, and that time is long gone. History has taught us there are no silver …
WatchGuard introduces next-generation firewall
WatchGuard unveiled its most powerful security appliance, the XTM 2050. This next-generation firewall (NGFW) providessecurity for large organizations and data centres that …
Security needs to be unified, simplified and proactive
IT security powerhouse Check Point is on a mission to make the management of security products unified and simplified, and nowhere has that message been more clear than at its …
Creating a secure firewall policy for a large company
When it comes to a network security policy, there often seems to be a direct tradeoff between security and maintainability. This doesn’t always have to be the case. Even …
Holes found in majority of leading network firewalls
Firewalls are well understood as the main barriers between an organization’s internal and external networks. Over the past 25 years, they have become the foundation of …
Battling with manual firewall analysis
In a survey by Skybox Security, 42% of respondents had more than 100 firewalls to manage, and 67% said they have firewalls from multiple vendors. In fact, 54% said their firm …
IronBee versus ModSecurity
After spending a couple of weeks talking about IronBee to anyone willing to listen, I have assembled a list of commonly asked questions. Not unexpectedly, the question that …
Securing data centers from blended threats
Fortinet announced the addition of a new consolidated security appliance to its FortiGate product family, and a new release of its FortiOS 4.0 operating system for said …
IronBee: Creating an open source web application firewall
Qualys announced IronBee, a new open source project to provide the next-generation of web application firewall (WAF) technology. Led by the team who designed and built …
The security landscape from 2010 to 2011
Vendor-neutral testing and certification firm ICSA Labs offers its thoughts on the security landscape spanning 2010 and 2011. Mobile security 1. While most hackers heavily …
Web-based stealth attacks on network security will dominate 2011
Viruses will become more subtle and even harder to detect in 2011, and the primary line of attack will continue to be via the internet, according to Redscan. Malware is now …
Featured news
Sponsored
Don't miss
- Hackers breaching construction firms via specialized accounting software
- Ghost: Criminal communication platform compromised, dismantled by international law enforcement
- Critical VMware vCenter Server bugs fixed (CVE-2024-38812)
- CrowdSec: Open-source security solution offering crowdsourced protection
- Detecting vulnerable code in software dependencies is more complex than it seems