Next-generation firewalls, or application-aware firewalls, have enjoyed well-deserved hype from network engineers and analysts, but the technology is still evolving. Many enterprises are also holding onto their old port and protocol firewalls, at least for now.
IT is a tough job, but somebody's got to do it. And these days it takes a team of talented technology professionals, each with his or her own special expertise, to carry out mission-critical assignments.
The war is over and, in case you missed it, IT lost. The once ferocious attempts to guard the corporate perimeters against unapproved devices and applications is sputtering to an end because, frankly, all but myopic IT diehards recognize this is battle that's already over.
Palo Alto Networks has a concise message for channel partners: The security company was cash-flow positive in its most recent quarter, and is looking to double its business in the year ahead. To assist with that effort, Palo Alto Networks has recruited roughly 150 channel partners and is now working with two distributors: Westcon Group and Computerlinks.
Network security upstart Palo Alto Networks has signed distribution agreements with Westcon Group and Computerlinks, marking the first time Palo Alto's security products will be sold through two-tier distribution in North America.
Palo Alto Networks, the three-year-old networking security vendor, has moved to two-tier distribution, signing with Westcon and Computerlinks. And Westcon has a new many to handle its security division, former Avnet executive Andrew Warren.
As you probably know, last year Gartner recommended that enterprises migrate from stand-alone IPS to next-generation firewalls for performing IPS functions. While this advice made intuitive sense based on the tight relationship between apps and threats, there was nevertheless a lack of empirical evidence to confirm that a next-generation firewall could actually stand up to the challenge of being a true IPS – until now.
Traditionally, firewalls have been designed to be cornerstone of network security. But, in reality legacy firewalls are no longer an effective security solution to manage the risks and rewards of today’s Internet applications in the enterprise.
Palo Alto Networks™, the network security company, today announced that it has received the prestigious recognition of Frost & Sullivan's "2010 Global Entrepreneurial Company of the Year Award" for its accomplishments in the firewall market.
It happens every day: an employee who's out of the office wants to get into his machine at work. Instead of using a more secure method, he decides to email some files to his home machine, or upload a file to Facebook, or use a popular PC file-sharing tool. And the next thing you know, your organization is dealing with a major data leak.
This week the Ponemon Institute released a study of almost 600 IT security professionals who overwhelmingly reported an increase in advanced threats and a lack of proper security mechanisms to deal with them.
Multiple vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can cause denial of service conditions.
When pitching venture firms, entrepreneurs typically include a slide that shows revenue curving sharply up and to the right shortly after launch – what’s known as the “hockey stick” – but even the best companies rarely meet those projections.
In the past, firewalls worked based on their protocol to apply to all available applications. Next generation firewalls, like those being developed by Palo Alto Networks need to better control apps to protect the network. This Info Tech report discusses next-gen firewalls and how compliance and application usage is changing the role of the firewall in network security.
Other than obliterating productivity, Facebook represents a substantial security risk in the corporate world. However, it's also becoming a powerful marketing tool. So, how do you leverage Facebook without opening the company up to all kinds of malware?