Are you ready to deploy a Next Generation Firewall?
Lemarchand 2 years ago
Is Palo Alto the only true NGFW? SonicWall? Juniper SRX? Do you think that Gartner's definition of a NGFW is correct? Does anyone know of a matrix that maps out which vendors products truly meet the guidelines and which ones are just bolt on "catch up" attempts to create a NGFW?
Is the technology still in its infancy or is it mature enough to be deployed in major enterprises?
Topic: SecurityAnswer this Question
Ask a question
As Beth Jacob's resignation from Target shows, retail CIOs are culpable for security breaches even though they might not have the resources in-house to protect the company.
ManTech's HBGary subsidiary found Skype-based malware 'hiding in plain sight' on customer's network.
With some opening shots in a cyber component to the war of nerves in the Ukraine already fired, security analysts today offered a look at how a full-fledged cyberwar in the region would unfold.
The U.S. Federal Trade Commission should investigate Facebook's proposed US$19 billion acquisition of mobile messaging app WhatsApp -- and possibly block it -- because of the potential impact on users' privacy, two privacy groups said in a complaint filed Thursday.
Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed by Tableau Software, a provider of business intelligence software, and Splunk, which sells a log-file search engine.
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware.
After 20-plus years of service, the technology remains a core part of the IT security stack despite its long predicted demise.
Java's prevalence on devices and lax defenses make it a favorite target of malware developers.
Cisco Systems released new firmware versions for some of its small business routers and wireless LAN controllers in order to address vulnerabilities that could allow remote attackers to compromise the vulnerable devices or affect their availability.
Metadata has had a bad rap lately, with disclosures tying its collection to government spying programs. But those bits of information lurking behind our phone calls, photos and online chats can be useful in other ways if they're harnessed properly.