It is no secret that modern information-based attacks have become increasingly sophisticated and common, and these advanced threats present one of the most important challenges facing network security teams today. In this whitepaper, we look at some of the most important criteria to consider when architecting your defences against advanced attacks and modern malware.
For enterprise IT security organizations, the evolution of applications and threats, coupled with the stagnation of traditional network security technology has resulted in a loss of visibility and control. This paper examines three different organizations, the legacy infrastructure they replaced, the firewalls they deployed and the subsequent savings.
This whitepaper provides provides a global view into enterprise application usage and the associated threats by summarizing network traffic assessments conducted in 3,056 organizations worldwide in 2012. The application and threat patterns discussed within this report dispel the position that social networking, filesharing and video applications are the most common threat vectors, while reaffirming that internal applications are highly prized targets.
The data in this presentation is based on actual network traffic. Findings include: Number of social networking applications per organisation; Number of browser-based filesharing applications per organisation; filesharing use for entertainment or work and more. See the results of this Application Usage and Risk Report.
The ever-increasing demands for application availability and performance, the constantly evolving threat landscape, and the need to understand what is happening with applications from a security perspective combine to make the seemingly easy demands for data center network security much more difficult to meet. Indeed, most organizations have been forced into significant compromises – trading security, function, and visibility for performance, simplicity, and efficiency. Read on.
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprisefocused, and distinct, many network security vendors are claiming NGFW is a subset of other functions (e.g. UTM or IPS). Most traditional network security vendors are attempting to provide application visibility and control by using a limited number of application signatures supported in their IPS or other external database. But underneath, these capabilities are poorly integrated and their products are still based on legacy port-blocking technology, not NGFW technology. Read on.
The firewall market has traditionally been a staple, yet, mature market within the security space with little innovation being introduced. However, with the rapid change in the technology and threat landscape, a newer breed of of innovation focussing on applications visibility and control, termed Next Generation Firewalls has surfaced. This paper examines how Next Generation Firewalls can help organisations identify and block threat, while at the same time enforcing policies at an application level and ultimately helping organisations reduce the number of security devices and thus, saving costs.
Most Popular Reviews
- 1 Google Pixel XL full, in-depth smartphone review: Phones just got smarter
- 2 Sony Xperia XZ review: turbo-charged last-gen phone
- 3 Hisense Series 7 ULED 4K UHD TV review
- 4 Sony X9300D and X8500D UHD 4K TV review
- 5 Moto X Force review: Leading features from a mid-range phone
Join the PC World newsletter!
Latest News Articles
- Extreme swallows Zebra’s WLAN biz for $55 million
- Facebook to begin testing its Internet drone this year
- Apple's Q1: Record $US18.4 billion profit, but iPhone sales are slowing
- Vodafone puts idle smartphones to work to fight cancer
- A look at the connected police car concept (+12 photos)
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.
The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.
The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.
My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.
- Google Pixel XL full, in-depth smartphone review: The new best Android phone
- Japan Robot, gadget and car expo slideshow
- Panasonic DX900U UHD 4K smart TV review: Best all-round TV ever?
- What's the difference between an Intel Core i3, i5 and i7?
- Laser vs. inkjet printers: which is better?
- CCBusiness Consultant - CPM SoftwareVIC
- CCSenior Project ManagerNSW
- TPProject CoordinatorNSW
- CCBusiness Analyst- (MQC, QTP, BPMN, Visio or System Architect;NSW
- CCWeb DeveloperNSW
- CCServiceNow ConsultantNSW
- FTCRM ConsultantWA
- CCContract Analyst Programmer (Windows Server) 161031/AP/962Asia
- CCNetwork and Security Design EngineerNSW
- FTMid Level Full Stack DeveloperNSW
- FTMid-Senior Android DeveloperNSW
- CCSenior Business AnalystSA
- FTMultiple Permanent Project Manager rolesACT
- FTHead of Information and Digital Technology at Taronga ZooNSW
- CCHuman Sciences Professional - DefenceSA
- FTChief Enterprise ArchitectNSW
- CCTechnology Training ManagerNSW
- CCContract Senior IT Assistant (Lotus Notes) 161101/SITA/571Asia
- FTOperations SupportNSW
- FTIT Operations ManagerNSW
- FTDirector Data AnalyticsACT
- TPOracle Apex DeveloperWA
- FTGraduate Software Consultant - SQL Server programming skillsACT
- CCAcquisition Marketing Executive - B2BNSW
- CCProject ManagerVIC