Security

Knowledge Is Power: Tactical Approaches to Using Network Security Technologies for Deeper Insights

Download Now Free registration required

Executive Summary

Enterprise security managers have successfully deployed firewalls to provide perimeter security for many years. While perimeter firewall technology continues to evolve, such as in the recent inclusion of UTM (unified threat management) features, most of all consider perimeter firewalls to be mature technologies, commonly accepted, and well understood. However, the relative stability and immobility of firewalls presents a problem for the security manager, because the threat landscape continues to evolve, both rapidly and aggressively. In particular, this "Threat Evolution" has occurred in the presence of solid perimeter firewalls, which means that the newest and most dangerous threats are specifically designed to operate in an environment with strong firewalls in place.

  • Format: PDF
  • Size: 483.2 KB