Firewalls first came out in the late 1980s when security breaches drew attention to the need to make networks more secure. In those early days, just having a firewall made a network more secure, because hackers hadn’t yet written applications that could get around it. But as hackers have created new applications, the firewall has become like a utility belt with more and more necessary gadgets—URL filtering, content filtering, intrusion detection—to block new threats that can dodge the firewall’s port-based security.
There’s a great article on SearchEnterpriseWAN about a Palo Alto Networks customer. IDT spoke to SearchEnterpriseWAN about its experiences using next-generation firewalls from Palo Alto Networks, and discussed some of the benefits and changes their team recognized in managing security across their enterprise.
Wide area network (WAN) operations should include more than security management, but one global telecom operator drowning in thousands of firewall requests for its data centers around the world found little time to do much else.
Palo Alto Networks, a provider of next-generation enterprise firewalls, has announced that its PA-4000 Series firewalls have been selected by IDT Corporation, a Fortune 1000 company that delivers local, long-distance and calling card services.
The use of Facebook, Twitter and Google Docs in the workplace has increased dramatically in the past six months and their crossover from personal to business applications is accelerating, according to a new study released Monday.
If you use one of those ever-popular social networking applications for work purposes, or just for personal business while on the job, then you aren't alone, according to a recent industry report, but such usage can harm your network security as well.
The use of social networking and collaborative applications for business purposes has 'skyrocketed in the past six months. With increased adoption of Web-based applications come new business and security risks that go far beyond potential productivity losses.
Greg Young and John Pescatore just authored an excellent note on next-generation firewalls. In the note, “Defining the Next-Generation Firewall,” Greg and John do an excellent job laying out the definition, the requirements, and their recommendations for next-generation firewalls in the enterprise.
Sometimes, the problems we experience with computers are a result of a legacy design. Hardware or software might have been architected 10 or 20 years ago when the world of computing was vastly different from the way it is today. As a result, the product in use today isn't as effective as it could be because of aging or obsolete design.
Texas A&M University at Galveston (TAMUG) houses the Texas Maritime Academy, which is one of six state maritime academies in the U.S. preparing graduates as officers in the United States Merchant Marine.
The firewall is still relevant but needs a complete overhaul for it to work efficiently.
Commenting on the issue raised by the SC Studio debate on the future of the firewall, Lee Klarich, vice president of product management at Palo Alto Networks, stated that the firewall is definitely not dead, but traditional firewalls are so far behind the application and threat developers that it sometimes feels like it.
The emergence of Palo Alto Networks (hereby referred to as 'Palo Alto') has undoubtedly injected a lot of buzz into the network security segment that has been devoid of any epochal leap, ever since the introduction of stateful inspection and the marriage between firewall technology and IPSec VPN gateways.
What do LinkedIn, Twitter, Blogging and Wikis have in common? According to this article, they are increasingly used within enterprises with a quarter of organizations actually rolling out these types of tools across all departments, up from 12% in the previous survey.
Palo Alto Networks makes no bones about it: "It's time to fix the firewall." The network security vendor prides itself on partnering with leading-edge, innovative partners that want more than just basic firewall functionality.