Access "Magic Quadrant: Next-generation firewalls are mainstream"
This article is part of the April 2012 Vol. 3, No. 2 issue of Network security in a world of mobile workers
Skepticism about next-generation firewalls is finally ending according to the new Gartner firewall Magic Quadrant. Now as enterprises implement the new technology, they've got to overcome the kinks that come along with it. Gartner's research shows that stateful firewalls, which make decisions based on ports and protocols, are now considered a legacy technology while enterprises are evaluating and installing next-generation firewalls in large numbers. “I think traditional firewalls aren’t stopping the majority of threats that are hitting companies,” said Mark Starry, CTO of Capital Region Healthcare and Concord Hospital in New Hampshire. “Every other month I get on the phone with a hospital that has been infected with something and they’re just using a standard firewall with some kind of IPS [Intrusion Prevention System] glommed onto it.” Starry replaced his legacy Check Point Software and Juniper Networks firewalls two years ago with next-generation firewalls from Palo Alto Networks. He’s seen all of the other large hospitals in New Hampshire switch to Palo ... Access >>>
Premium Content for Free.
Is virtual desktop infrastructure the answer?
by Nathan Eddy
IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.
Networking for BYOD: No single solution
by Rivka Gewirtz Little
An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.
- Is virtual desktop infrastructure the answer? by Nathan Eddy
NAC technology evolves in a BYOD policy world
by Amy Larsen DeCarlo
Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.
Mobile device security best practices for BYOD
by Lisa Sampson, Feature Writer
BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."
- NAC technology evolves in a BYOD policy world by Amy Larsen DeCarlo
Magic Quadrant: Next-generation firewalls are mainstream
by Shamus McGillicuddy
Next-generation firewalls have enjoyed a lot of hype in recent years, but now they are also dominating the market, according to Gartner’s latest firewall Magic Quadrant.
A mobile device security strategy that puts users first
by Christina Torode, Editorial Director
With the right strategy, mobile device security doesn't have to be a compromise between user demands and network risks.
- Magic Quadrant: Next-generation firewalls are mainstream by Shamus McGillicuddy
More Premium Content Accessible For Free
VPN lockdown: Evaluating cloud vs. managed VPN providers
Virtual private networks (VPNs) are essential for protecting corporate data. As we explore in this issue of Network Evolution, the pressure to...
Does SDN change everything in network architectures?
Some experts predict that the network functions virtualization (NFV) and software-defined networking (SDN) mean that physical network equipment will ...
Your next switch: The data center's software-defined future
The hardware-defined network is still around, but a software-defined switch is coming. Your next switch will include SDN features and will also need ...