The year that changed everything, and how you’ll have to adapt in 2021 The pandemic will burn itself out eventually, but its effects will not. We’re different people now – we’re intimate with streaming catalogs...
Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could...
This is part 3 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read myth #2 here. One of the oldest security...
This is part 2 of a 4-part series addressing compliance myths and what you need to know about uniting compliance and security in a hybrid environment. Read part #1 here. Many organizations have adopted a...
Change has never been a friend of network security. Neither has complication. Right now, we have too much of both. The Covid-19 pandemic has resulted in an unprecedented shift to remote work, bringing an avalanche...
Having out-of-the-box integrations with common tools and cloud platforms are critical enablers to security, but flexibility is important too. Most enterprises have multiple vendors across their infrastructure and want access to an open API so they build their own integrations.
Keeping pace with the rapid growth of the hybrid cloud growth is difficult for security professionals when everything’s done manually. FireMon’s State of Hybrid Cloud Security Survey found most respondents still don’t have the benefits of automation that can help security policy keep up with cloud-first strategies. Nearly two-thirds (65.4 percent) said they use manual...
This may outright stun a few security professionals, but it is (yes, affirmative) possible for migrations to be relatively fast, totally secure and overall mostly painless.
The firewall cleanup rule is the explicit rule at the bottom of a firewall policy defined as: Source = ANY Destination = ANY Service / Application = ANY Action = DROP Logging = Enabled Why...
Updated – January 2017 The firewall stealth rule is the explicit rule near the top of the policy denying access to the firewall beyond what is required to manage the device. It should be...