Threat and Vulnerability Management

Threat and Vulnerability Management | News, how-tos, features, reviews, and videos

SonicWall stands tall in SSL decryption testing

If one of the main advantages of a next-generation firewall is application and protocol identification and control, then SSL decryption is a basic requirement. We looked at the SSL decryption capabilities of the next-generation...

Palo Alto next-gen firewall stacks up well

Palo Alto Networks has bet everything on being a next-generation firewall. Without the next-generation hook, Palo Alto has little chance at breaking into the established world of firewalls, and they've done a good job at defining the...

Next-gen firewalls require external visibility tools

Knowing what's happening on your network is a pre-requisite to controlling the traffic. We call that visibility because it combines all of the information the firewall knows, including session and application information, traffic...

Next-gen firewalls: Off to a good start

When we tested four next-gen firewalls strictly on performance, we found that the products could forward packets at impressive rates, but throughput dropped when advanced security features were turned on. We now dive deep into...

Check Point takes best approach to URL filtering

URL filtering has become a "checkbox" feature on most Unified Threat Management firewalls, and no wonder: it doesn't require a lot of imagination to do it right, and it's hard to really differentiate yourself or do a bad job of...

Fortinet has highest catch rate in IPS testing

We tested the intrusion prevention capabilities of each of the next-generation firewalls to determine how well they work and how the IPS integrates with system management. We were especially concerned with the IPS workflow for false...

How we tested next-generation firewalls

We tested next generation firewalls by looking at seven separate areas that we felt would be important to network managers trying to deploy these products in enterprise networks. We evaluated the basic firewall functionality of each...

Survey: Screwing up network changes one of biggest causes for security, management failures

According to a survey of 182 IT security and operations professionals, one of the biggest security and management challenges they face is ... how they screw up their own networks. Yes, it's internal IT screw-ups caused by unscheduled...

Chinese Firewall'S Most Blocked Terms

deck not set. please replace this message with an appropriate value

Is a next-generation girewall in your future?

The traditional port-based enterprise firewall, now looking less like a guard and more like a pit stop for Internet applications racing in through the often open ports 80 and 443, is slowly losing out to a new generation of brawny,...

Review: Firewall Operations Management

Anyone running multiple firewalls in a complex, enterprise environment knows how difficult it can be to catch misconfigurations, avoid conflicting rules, identify vulnerabilities and meet auditing and compliance mandates.

Tip

Unified Threat Management Appliances: How to Choose 'Em and Use 'Em

Expert advice on evaluating and selecting a unified threat management (UTM) appliance that fits your needs

Cyberoam Launches Security Certification Program

Cyberoam, the Identity-based Unified Threat Management (UTM) solution, has announced the launch of the Cyberoam Security Certification Program, aimed at fulfilling the market need for certified professionals in identity-based...

Cost-Cutting Through Green IT Security: Real or Myth?

Some say the concept of green IT security is a stretch, but others see a real opportunity to cut costs as well as carbon emissions. (Part two in a series: How to Manage Security in a Recession)

Load More
You Might Also Like