Unified Threat Management

Unified Threat Management | News, how-tos, features, reviews, and videos

Next-gen firewalls require external visibility tools

Knowing what's happening on your network is a pre-requisite to controlling the traffic. We call that visibility because it combines all of the information the firewall knows, including session and application information, traffic...

Check Point takes best approach to URL filtering

URL filtering has become a "checkbox" feature on most Unified Threat Management firewalls, and no wonder: it doesn't require a lot of imagination to do it right, and it's hard to really differentiate yourself or do a bad job of...

Palo Alto next-gen firewall stacks up well

Palo Alto Networks has bet everything on being a next-generation firewall. Without the next-generation hook, Palo Alto has little chance at breaking into the established world of firewalls, and they've done a good job at defining the...

Survey: Screwing up network changes one of biggest causes for security, management failures

According to a survey of 182 IT security and operations professionals, one of the biggest security and management challenges they face is ... how they screw up their own networks. Yes, it's internal IT screw-ups caused by unscheduled...

Chinese Firewall'S Most Blocked Terms

deck not set. please replace this message with an appropriate value

Is a next-generation girewall in your future?

The traditional port-based enterprise firewall, now looking less like a guard and more like a pit stop for Internet applications racing in through the often open ports 80 and 443, is slowly losing out to a new generation of brawny,...

Review: Firewall Operations Management

Anyone running multiple firewalls in a complex, enterprise environment knows how difficult it can be to catch misconfigurations, avoid conflicting rules, identify vulnerabilities and meet auditing and compliance mandates.

Tip

Unified Threat Management Appliances: How to Choose 'Em and Use 'Em

Expert advice on evaluating and selecting a unified threat management (UTM) appliance that fits your needs

Cyberoam Launches Security Certification Program

Cyberoam, the Identity-based Unified Threat Management (UTM) solution, has announced the launch of the Cyberoam Security Certification Program, aimed at fulfilling the market need for certified professionals in identity-based...

Cost-Cutting Through Green IT Security: Real or Myth?

Some say the concept of green IT security is a stretch, but others see a real opportunity to cut costs as well as carbon emissions. (Part two in a series: How to Manage Security in a Recession)

Load More
You Might Also Like