Next-generation firewalls from Palo Alto Networks combine three identification technologies to provide the unprecedented visibility and policy control over applications, users and content – all in a high-performance firewall platform.
The adoption and usage of Enterprise 2.0 applications in the workplace is growing at astronomical rates. While there is ample proof of the business benefits of their use, there continue to be major security and compliance risks associated with them.
The growth of applications like Twitter and Facebook over the last year has been astounding. At Palo Alto Networks, Worldwide Marketing VP Rene Bonvanie says that presents a problem for many employers.
Firewalls first came out in the late 1980s when security breaches drew attention to the need to make networks more secure. In those early days, just having a firewall made a network more secure, because hackers hadn’t yet written applications that could get around it. But as hackers have created new applications, the firewall has become like a utility belt with more and more necessary gadgets—URL filtering, content filtering, intrusion detection—to block new threats that can dodge the firewall’s port-based security.
There’s a great article on SearchEnterpriseWAN about a Palo Alto Networks customer. IDT spoke to SearchEnterpriseWAN about its experiences using next-generation firewalls from Palo Alto Networks, and discussed some of the benefits and changes their team recognized in managing security across their enterprise.
Wide area network (WAN) operations should include more than security management, but one global telecom operator drowning in thousands of firewall requests for its data centers around the world found little time to do much else.
Palo Alto Networks, a provider of next-generation enterprise firewalls, has announced that its PA-4000 Series firewalls have been selected by IDT Corporation, a Fortune 1000 company that delivers local, long-distance and calling card services.
The use of Facebook, Twitter and Google Docs in the workplace has increased dramatically in the past six months and their crossover from personal to business applications is accelerating, according to a new study released Monday.
If you use one of those ever-popular social networking applications for work purposes, or just for personal business while on the job, then you aren't alone, according to a recent industry report, but such usage can harm your network security as well.
The use of social networking and collaborative applications for business purposes has 'skyrocketed in the past six months. With increased adoption of Web-based applications come new business and security risks that go far beyond potential productivity losses.
Greg Young and John Pescatore just authored an excellent note on next-generation firewalls. In the note, “Defining the Next-Generation Firewall,” Greg and John do an excellent job laying out the definition, the requirements, and their recommendations for next-generation firewalls in the enterprise.
Sometimes, the problems we experience with computers are a result of a legacy design. Hardware or software might have been architected 10 or 20 years ago when the world of computing was vastly different from the way it is today. As a result, the product in use today isn't as effective as it could be because of aging or obsolete design.
Texas A&M University at Galveston (TAMUG) houses the Texas Maritime Academy, which is one of six state maritime academies in the U.S. preparing graduates as officers in the United States Merchant Marine.
Displaying 6001 - 6030 of 6172
Get the latest news, invites to events, and threat alerts