Premium Content

Access "Magic Quadrant: Next-generation firewalls are mainstream"

Shamus McGillicuddy, News Director Published: 10 Oct 2012

Skepticism about next-generation firewalls is finally ending according to the new Gartner firewall Magic Quadrant. Now as enterprises implement the new technology, they've got to overcome the kinks that come along with it. Gartner's research shows that stateful firewalls, which make decisions based on ports and protocols, are now considered a legacy technology while enterprises are evaluating and installing next-generation firewalls in large numbers. “I think traditional firewalls aren’t stopping the majority of threats that are hitting companies,” said Mark Starry, CTO of Capital Region Healthcare and Concord Hospital in New Hampshire. “Every other month I get on the phone with a hospital that has been infected with something and they’re just using a standard firewall with some kind of IPS [Intrusion Prevention System] glommed onto it.” Starry replaced his legacy Check Point Software and Juniper Networks firewalls two years ago with next-generation firewalls from Palo Alto Networks. He’s seen all of the other large hospitals in New Hampshire switch to Palo ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features
    • Is virtual desktop infrastructure the answer? by Nathan Eddy

      IT organizations are finding that virtual desktop infrastructure is ready-made to take on the biggest BYOD challenge—providing secure, remote access to corporate assets.

    • Networking for BYOD: No single solution by Rivka Little

      An architecture firm IT manager finds himself mitigating the risks of BYOD after he realizes there is no easy answer to managing and securing personal devices on the network.

    • NAC technology evolves in a BYOD policy world by Amy Larsen DeCarlo

      Just when we thought NAC had fizzled, the technology may make a comeback as IT managers seek news ways of controlling personal mobile device access to corporate networks.

    • Mobile device security best practices for BYOD by Lisa Sampson, Feature Writer

      BYOD policies require a new set of mobile device security best practices. Instead of thinking, “Block access,” network managers must now think, “Enable access safely."

More Premium Content Accessible For Free

  • Harvesting business intelligence with network monitoring tools
    network_evolution_august_2013.png
    E-Zine

    Network technologies and architectures are rapidly changing due to a wide range of innovations from software-defined networking to gigabit wireless. ...

  • WAN optimization policy goes deep
    sNetworking_Network_evolution_june_2013.png
    E-Zine

    The nature of the branch office is changing. Previously, branch offices were small remote sites with groups of workers that had a single focus, such ...

  • Hybrid Cloud networking falls short, but not for long
    evolution_cover_april_2013_landscape.PNG
    E-Zine

    As if network management isn’t hard enough, now engineers must find ways to manage physical networks, virtual networks and SDN environments. In this ...