AlgoBuzz Blog

Everything you ever wanted to know about security policy management, and much more.

Search
Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt
Search in comments
Filter by Custom Post Type
Posts

Ensuring Your Firewalls are Properly Configured

by

The network perimeter has disappeared for many reasons including some common buzzwords these days such as BYOD, the cloud and more. But what often is overlooked is that the majority of firewall breaches (the traditional first line of defense) are actually caused by improper configurations (see our “horror stories” blog series where we highlighted some real-life firewall misconfiguration examples).

Employing new technologies that provide more granular control is a good step to mitigating this risk, but without maintaining the defined firewall configurations over time, these security devices cannot provide the protection they should. Next week, we’re joining our partner McAfee on the webcast “Regaining Control of the Network Perimeter” where we’ll examine this challenge, offer recommendations to improve firewall policy management and reduce risk, and review a real-life case study. See you on Tuesday!

 

Subscribe to Blog

Receive notifications of new posts by email.