11 cool things your firewall should do

| July 17, 2019

article image
Traditional stateful packet inspection firewalls focus on blocking network layer threats by evaluating the ports and protocols used by network layer traffic. The latest next-generation firewalls (NGFWs) utilize deep packet inspection to scan the entire packet payload to provide advanced intrusion prevention, antimalware, content filtering and anti-spam. Many applications are delivered over the web sharing common ports and HTTP or HTTPS protocols. This effectively leaves traditional firewalls blind to these applications and unable to prioritize productive and secure versus unproductive and potentially insecure traffic. Next-generation firewalls provide insight into the applications themselves, providing a critical capability for networking professionals.

Spotlight

CLUSIT

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security, including awareness among IT specialists and the general public, and government advisorship and lobbying for causes relevant to information security.

OTHER ARTICLES

Unify NetOps and SecOps with SD-WAN Cloud Management

Article | March 4, 2020

CIOs know that ubiquitous connectivity across domains—campus, branch, cloud, and edge, wired or wireless—is a baseline requirement for building a digital enterprise. But, as CISOs know, as the network fabric spreads to encompass devices and location-agnostic data and compute resources, the need for end-to-end integrated security is equally paramount. Add in the necessity to continuously monitor and maintain application performance throughout campus and branch and edge locations and you create an enormous workload for NetOps and SecOps teams that are simultaneously dealing with static CapEx and OpEx budgets. Often the result is a tug-of-war between the teams: one striving to keep the network optimized for performance and availability, the other striving to keeping data, applications, and devices secure.

Read More

Cisco Dreams of a 5G WAN

Article | March 10, 2020

Cisco envisions a future in which enterprise’s WANs are connected not by MPLS or broadband, but instead by high-speed, low-latency cellular networks, or what it calls the wireless WAN. Once relegated to failover, Cisco says today’s cellular networks, in particular 5G, offer high enough throughput and low enough latency to be viable alternatives to traditional wired networks. “About 10-years back everyone would say that my primary circuit from the enterprise branch was MPLS and then the higher bandwidth speed of having an internet circuit became a viable alternative,” said Shankar Ramachandran, director of product management, routing platform at Cisco, in an interview with SDxCentral.

Read More

How safe is 5G really?

Article | February 19, 2020

The 5G era is about to arrive, to enable a host of new business applications. The next-generation cellular technology is designed , but 5G security is also much more complicated to manage. 5G poses an elevated security threat partly because there are more vectors through which adversaries can attack. The technology is set to enable a huge number of connected devices, collectively known as the ).

Read More

Why businesses need to start thinking about 5G.

Article | February 20, 2020

5G services are creeping out to the market but it will take a few years before the full potential of next-generation connectivity is fully understood and realised. But businesses need to start thinking about the technology now, because iterative improvements over 4G connectivity are only part of the story. When core 5G networks are fully rolled out, they will trigger a whole new wave of disruption and opportunity. Here are a few examples of what we know we can expect.

Read More

Spotlight

CLUSIT

Clusit is the Italian Association for Information Security, a nonprofit organization devoted to promoting every aspect of information security, including awareness among IT specialists and the general public, and government advisorship and lobbying for causes relevant to information security.

Events