Burned by firewalls

Messmer, Ellen
September 1998
Network World;09/21/98, Vol. 15 Issue 38, p1
Trade Publication
Looks at the performance of firewalls as a computer security option. Problems experienced with firewalls; Difficulties of the providers of firewall technology in keeping up with demand for firewall installations; Views of Brian Davids, director of computer operations and information services at NFL Properties company.


Related Articles

  • Network security: Mission impossible? Radcliff, Deborah // Software Magazine;Jan97, Vol. 17 Issue 1, p60 

    No abstract available.

  • Safeguarding your network. Davis, Joyce E.; Muhammad, Tariq K. // Black Enterprise;Oct96, Vol. 27 Issue 3, p48 

    Offers advice for companies on how to prevent computer network break-ins. Examination of audit trail kept by most operating systems; use of third-party software solutions; Ways on how to avoid importation of viruses.

  • Network watchdogs. T.K.M. // Black Enterprise;Oct96, Vol. 27 Issue 3, p50 

    Presents tools and resources to help business enterprises make their computer networks tamper-resistant. Security Analysis Tool for Auditing Networks; Computer Security Institute; Books on computer networks security.

  • Today's installations require whole-building power and data protection. Keil, Ken // Cabling Installation & Maintenance;Jul96, Vol. 4 Issue 8, p61 

    Discusses the use of the whole-building approach in efforts to protect local area networks, computer systems, high-speed modems and digital telephones from power quality problems. Appropriate protective strategy and actions for particular power and data quality problems; Spot protection and...

  • Safeguarding the keys to the enterprise. McQuilken, Barry // Telecom Asia;Sep96, Vol. 7 Issue 9, p58 

    Focuses on the adoption of token-based authentication technology by companies to protect computer networks. Features; Authenticating external and internal access; Equipment and supplies; Third party support issues.

  • Hire-a-hacker. Mamis, Robert A. // Inc.;Aug93, Vol. 15 Issue 8, p39 

    Announces Price Waterhouse Data Security Penetration Studies, New York City, now has available for hire a team of hackers who will launch unannounced raids on a company's access-control systems to evaluate their vulnerability. How the service works; Cost; Contact point for more information.

  • Editors Message. Das, Vinu V. // International Journal of Network Security (2152-5064);Oct2011, Vol. 2 Issue 4, following p36 

    An introduction is presented in which the editor discusses the need of research in the area of Privacy Preserving Protocols.

  • Businesses still leery of Internet security. Rodda, Kelli // Business Press;07/05/96, Vol. 9 Issue 10, p3 

    Reports on United States corporations' lack of adequate security systems to manage computer network access. Internal occurrence of security problems; Strategies to address information security.

  • Who's who in cyberspace: Issuing online passports. Pescatore, John // America's Network;4/15/96, Vol. 100 Issue 8, p10 

    Focuses on verifying the identity of someone on computer networks. Electronic mail addresses; Certificate authorities; Passport applications; Need for directories.

  • Security.  // Communications News;Feb95, Vol. 32 Issue 2, p76 

    Presents several security computer network devices. Western Telematic's low-cost phone; TGV's TCP/IP networks.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics