TITLE

The Future Of The Firewall

AUTHOR(S)
Wilson, Jeff
PUB. DATE
May 2005
SOURCE
Business Communications Review;May2005, Vol. 35 Issue 5, p28
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reports on the future of Firewall computer security system. The term firewall has other uses besides referring to Internet security. In the late 1980s, routers used packet filtering to separate network segments so problems in one segment didn't affect other segments. Every network-connected system on earth faces threats that could be mitigated with a firewall, but many still are not protected by firewall. Firewall come in a variety of form factors--software that installs on the host, software for network servers, standalone hardware appliances, and network-integrated firewall. Many small and medium organizations are in a situation similar to the home users, in that the products they can afford or are willing to spend money on aren't necessarily capable of protecting them from today's sophisticated attacks. Enterprise-class firewall start at about $300, and that price will come down, but many small and medium organizations don't know how to find the right products, nor do they know how to install and manage them.
ACCESSION #
16971669

 

Related Articles

  • Safety and Security on the Internet.  // World Almanac & Book of Facts;2004, p714 

    Discusses safety and security on the Internet. Basic security rules, such as using caution when giving out personal information; Computer viruses; Importance of installing antivirus software on computers; How protective firewall software guards against hacker attacks; Browsers which allow the...

  • IPv6 Packet Traceback: A Survey. Singh, Rajesh Kumar; Pundir, Sumit; Pilli, Emmanuel S. // International Journal of Computer Applications;Jul2013, Vol. 74 Issue 1-21, p31 

    The Internet is expanding year by year and providing services of convenience and commercial value. It is also becoming prone for many attacks. Every day, new vulnerabilities are found, new threats are detected and attacks are launched. We need countermeasures for these attacks and IDS and...

  • LET'S GET PERSONAL--FIREWALLS. Schweitzer, Douglas // Certification Magazine;May2004, Vol. 6 Issue 5, p50 

    The article provides tips in using personal firewalls. Firewalls are the gatekeepers of the Internet. Simply put,a firewall is an electronic barrier designed to keep unauthorized computer programs or Internet users from accessing a private computer or network. With the exception of the built-in...

  • Place Your Trust in the New Perimeter. Blakley, Bob // Information Security;Jul/Aug2007, Vol. 10 Issue 7, p31 

    The author comments on the movement of the network perimeter from a few systems at the boundary of an Internet Protocol (IP) subnet onto endpoints in the form of personal firewalls and host-based IPS. He discusses the limitations of a network perimeter. He elaborates on the evolution of the...

  • DNS, Worms Threaten VoIP. R. S. // Bank Technology News;Sep2006 Supplement, Vol. 19, p12 

    The article focuses on the importance of enterprise network, from Voice-over Internet Protocol (VoIP)-ready firewalls to secure Internet telephony in the U.S. It has cited that VoIP system could be securing Exchange Bank's existing network security appliance. Theft of service, forced...

  • DETERMINA LAUNCHES MEMORY FIREWALL PROTECTION.  // Computer Security Update;Oct2005, p4 

    This article reports that Determina Inc., based in Redwood City, California, has announced that its patent-pending Memory Firewall product is the only proactive security solution available that can stop mass worm attacks. While traditional intrusion prevention systems rely on attack signatures...

  • No Trespassing! Schweitzer, Douglas // Certification Magazine;May2005, Vol. 7 Issue 5, p34 

    This article looks at the emergence of intrusion prevention systems (IPS) in the field of information technology. Malicious attacks on business-critical applications have become a fact of life for today's information technology managers and the need to protect networks from the endless stream of...

  • Hackers Are Not Just Smokers Anymore. Strunck, Guy // Oklahoma Dental Association Journal;Oct2011, Vol. 102 Issue 7, p26 

    The article discusses several lines of defense to save information from hackers stored in mobile devices and computers including medical records, billing and credit card information. It is presented that first line of defense includes firewall, spy ware etc. and second line of defense includes...

  • Critical Fixes for Windows, IE, Office. Johnston, Stuart J. // PCWorld;Nov2006, Vol. 24 Issue 11, p49 

    The article offers advice on how users can keep their computers safe from attacks. Although Microsoft issues a lot of critical updates, it is still not able to protect computers. Aside from that, the company's patches affect everything from Windows to Internet Explorer to Office applications....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics