Tuesday, May 08, 2012

Next-gen firewalls: Off to a good start

DHS looking for forensic tools to lift evidence from solid state drives | Microsoft blames and bans Chinese security partner for leaking Windows exploit

Network World Security

Forward this to a Friend >>>


Next-gen firewalls: Off to a good start
When we tested four next-gen firewalls strictly on performance, we found that the products could forward packets at impressive rates, but throughput dropped when advanced security features were turned on. We now dive deep into application identification and control - the defining features of next-gen firewalls - to find out what works and what doesn't. Read More


WHITE PAPER: NetIQ

Simplify Compliance and Security
This introduction to NetIQ Sentinel Log Manager provides insight into a flexible and cost-efficient software appliance that lights a clear path to complete, real-time, identity-aware security information and event management. Learn More!

RESOURCE COMPLIMENTS OF: Meru Networks

Reclaim power over your wireless network
A Meru WLAN restores your power of control and freedom of choice. No longer will the limitations of traditional networks be a burden on your productivity. Meru brings you wire-like connection quality, radically easier management, and support for unlimited devices. Scalability, flexibility, and simplicity are yours. Learn more at merunetworks.com

DHS looking for forensic tools to lift evidence from solid state drives
The Department of Homeland Security is looking for tools to help the law enforcement community better pull forensic evidence from solid state drives found in smartphones and GPS devices in particular. Read More

Microsoft blames and bans Chinese security partner for leaking Windows exploit
Microsoft issued critical patch MS12-020 to fix the Windows' Remote Desktop Protocol (RDP) vulnerability last month as it was spotted on a Chinese hacker forum and was being exploited in the wild. The kicker is that the exploit code was leaked from one of Microsoft's security partners in the Microsoft Active Protection Program (MAPP). Read More

Hot Products at Interop 2012
Click through all the products being released at the Interop conference in Las Vegas this week Read More

Basic firewall functionality: Check Point's maturity shows through
Enterprise firewalls must have policies to control traffic, ability to create site-to-site VPNs using standards-based IPsec, translate addresses and port numbers (NAT) when needed, and apply basic bandwidth management to traffic. They must also support features such as high availability (active/passive or active/active), virtual LANs, Ethernet link aggregation, and global management systems. Read More


WHITE PAPER: Fortinet

Next-Generation Security for Enterprise Networks
Since the concept of a 'next-generation firewall' was introduced several years ago by Gartner, many network security vendors have introduced their own next-generation firewalls to address this product category - but with varying results. View Now

Security Concerns Over a Data Center in the Cloud
When the company data center moves to various cloud configurations, the provisioning of servers will need to be addressed. Read More

How to fight back against privacy pirates
Have you Googled yourself lately? Is the information about you accurate or full of inconsistencies, both of which can be devastating? Read More

Fortinet has highest catch rate in IPS testing
We tested the intrusion prevention capabilities of each of the next-generation firewalls to determine how well they work and how the IPS integrates with system management. Read More

Palo Alto next-gen firewall stacks up well
Palo Alto Networks has bet everything on being a next-generation firewall. Without the next-generation hook, Palo Alto has little chance at breaking into the established world of firewalls, and they've done a good job at defining the category on their own terms. Read More


WHITE PAPER: Check Point Software

Check Point 3D Security Analysis Report Tool
Reduce security risks with the Check Point 3D Security Analysis tool. This comprehensive security analysis provides an easy-to-read report that summarizes security events, their risks, and remediation. See sample report View Now

SonicWall stands tall in SSL decryption testing
If one of the main advantages of a next-generation firewall is application and protocol identification and control, then SSL decryption is a basic requirement. We looked at the SSL decryption capabilities of the next-generation firewalls to see how well they would be able to discover applications, protocols, and URLs hidden within encrypted connections. Read More

iPhones, Android devices hot targets among 50,000 network attacks on California university
Almost 50,000 separate network attacks each week take aim at the California State University, San Bernardino, and the latest trend is seeing attackers go after students' Google Android and Apple iPhone mobile devices. Read More

Don't flush privacy in the name of security
On the face of it, the Cyber Intelligence Sharing and Protection Act (CISPA) that the U.S. House of Representatives just passed seems to address the long-held notion that encouraging private and public sector concerns to share security information will improve our general security. Read More

CISO Observations at an IBM Security Event
Earlier this week, I participated in an IBM event in NYC that was organized and hosted by the new IBM security division. There were around 40-50 security executives present from all industries and the topics of conversation ranged from mobile device security to the cooperative relationship between security and business executives. When you participate in an event with this type of an elite group,... Read More



SLIDESHOWS

7 reasons why Linux is a desktop flop
Writer Maria Korolov runs through all the reasons why Linux has not made any headway despite its many strengths.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. iPhone 5 with larger screen and thinner form factor on the horizon
  2. John McAfee, antivirus pioneer, arrested by Belize police
  3. NASA, Air Force, Harvard, military, ESA hacked by Gray Hats 'The Unknowns'
  4. Next-gen firewalls: Off to a good start
  5. Hard time: 10 tech CEOs sent to the slammer
  6. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  7. Why Linux is a desktop flop
  8. 'Smishing' attacks are on the rise
  9. Alcatel-Lucent brings 40G to the core
  10. iPhone 5 rumor rollup for the week ending May 4

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_security_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment