The most recent content from our members.
None of us are really normal. But when our tools make the things in our professional lives "normal," they make things a whole lot easier. What I'm talking about is a process commonly know as normalization. Normalization is the way in which a software program takes information from a variety of sources and translates it…
While we continually look for ways to simplify firewall configuration and change management tasks, a simple erroneous rule can lead to very big risks in the network. However careful we may be, redundant or shadowed rules always seem to find their way in. There’s certainly a pressing need for smart and easy ways to find and…
Amigos, Friends Tengo un pequeño problemita para iniciar el monitoreo de flujo NTA de solarwinds, tengo configurada las excepciones en el firewall de windows para tomar los flujos de un cisco ASA, pero el sistema me arroja el siguiente mensaje. I have a little problem for start the supervision Netflow NTA of SolarWinds, I…
Alright, here it is – Firewall Security Manager (FSM) 6.6 is now available! For those of you who were waiting for a reliable solution that would ensure the integrity of your firewall rules and manage the complex configuration in a multi-vendor firewall environment—it’s yours for the taking! If you are an existing customer…
Loopholes in the configuration of network devices like firewalls and routers pave the way for attackers to gain access into your network. Once in, they can easily lay hands on confidential data, alter important information, or even gain control over a machine and pose as a trusted system on the network. How can you protect…
Cisco firewalls are prevalent in today’s enterprise networks. There’s a good chance you have one, or likely, multiple Cisco security devices on your network. But, do you have enough resources to ensure these devices are being managed effectively? How do you know there are no undetected loopholes or that your firewalls are…
Given the nature of today’s dynamic networks, it should be no surprise that firewall administrators have their hands full trying to keep their networks secure while also maintaining the highest levels of performance and uptime. So, when something goes wrong, time is of the essence to get it fixed! Fortunately, there’s a…
How do you manage your firewall rulesets? Over time, firewall configuration files can become overrun with rules, and thus become large and complicated. It's not unusual for firewalls to have thousands of rules, and many of those are liable to be rendered obsolete by new rules as network and security teams add new rules to…
The Payment Card Industry (PCI) requires companies that process credit or debit card transactions to comply with 6 control objectives outlined in their Data Security Standard (DSS). These 6 objectives are: * Build and maintain and secure network * Protect cardholder data * Maintain a vulnerability management program *…
I recently saw the results of a survey published by Athena Security entitled “The Corporate Firewall-Playing With Fire” that stated that up to 95% of corporate firewalls may be vulnerable due to the difficulty of auditing them manually. It goes on to state that firewall audits require a review of the configuration rules…
It looks like you're new here. Sign in or register to get started.