ngfw | Page 4


Let's face it, there is a lot of confusion about Next Generation Firewalls and how they differentiate themselves from Unified Threat Management (UTM) devices, secure Web, and email security gateways. The myriad terms used to describe them are often used interchangeably -- and all too often incorrectly. So what exactly is a Next Generation Firewall (NGFW)? Gartner defines a NGFW as an "in-line security control that implements network security policy between networks of different trust levels in real time." If nothing else, a NGFW provides a... [Read More]
by RSS Stefanie Hoffman  |  Aug 21, 2013  |  Filed in: Security 101
This solution brief describes how Fortinet's NGFW technology offers identification and control of applications running over your network, an integrated intrusion prevention system (IPS) with deep packet scanning capabilities, and the ability to verify a user or device’s identity and enforce access policies accordingly. Also, this document describes additional technologies that provide you with a real-time ranking of the security risk of devices on your network along with cloud-based threat detection and prevention Download Link: http:... [Read More]
by RSS Rodney Mock  |  Jan 22, 2013  |  Filed in: Industry Trends & News
Tags: ngfw
In the following video, IT-Harvest's Richard Stiennon interviews John Maddison, Fortinet's vice president of marketing on how Fortinet views itself in the security market. Topics covered include network security performance, the depth and breadth of the company's product line and the company's technology innovation. [Read More]
by RSS Rick Popko  |  Jul 30, 2012  |  Filed in: Industry Trends & News
It’s a fact: Today’s threats have made the threats of yesterday a vision in the rear-view mirror, along with the security counterparts developed to tackle them. It’s also quite known that the legacy firewall is easily circumvented by modern threats. For example, botnets frequently communicate over common ports like HTTP to do their dirty work – sending stolen information and receiving tasks to carry out. Thus, one could deduce that TCP port 80 is a security threat and, on the strongest countermeasure, should be blocked. However, in today's... [Read More]
by RSS Derek Manky  |  Apr 12, 2011  |  Filed in: Security Research