top of page
Skybox customers looking for a new solution? We’ve got you covered.


Oren Amiram
Mar 18, 20244 min read
Why misconfigurations continue to plague public cloud network services and how to avoid them?
Oren Amiram, Director of Product at AlgoSec, explains why misconfigurations continue to plague public cloud network services and how...
2
0
Asher Benbenisty
Oct 31, 202311 min read
20 Best Network Security Solutions + FAQs
The best security posture is a multi-layered security posture. Enterprise security leaders understand that no single tool or solution can...
3
0


Asher Benbenisty
Oct 29, 20238 min read
20 Firewall Management Best Practices for Network Security
Firewalls are one of the most important cybersecurity solutions in the enterprise tech stack. They can also be the most demanding....
17
0


Asher Benbenisty
Oct 25, 202313 min read
The Application Migration Checklist
All organizations eventually inherit outdated technology infrastructure. As new technology becomes available, old apps and services...
4
0


Asher Benbenisty
Oct 25, 20239 min read
5 Types of Firewalls for Enhanced Network Security
Firewalls form the first line of defense against intrusive hackers trying to infiltrate internal networks and steal sensitive data. They...
6
0


Tsippi Dach
Aug 10, 20236 min read
Firewall troubleshooting steps & solutions to common issues
Problems with firewalls can be quite disastrous to your operations. When firewall rules are not set properly, you might deny all...
10
0


Kyle Wickert
Aug 9, 20237 min read
How to fix misconfigured firewalls (and prevent firewall breaches)
Firewall misconfigurations are one of the most common and preventable security issues that organizations face. Comprehensively managing...
3
0


Tsippi Dach
Aug 9, 20237 min read
Firewall has detected a new network
If your firewall shows a notification that it has detected a new network, it means it is doing one of its fundamental jobs properly. But...
0
0


Asher Benbenisty
Aug 9, 20236 min read
Firewall performance tuning: Common issues & resolutions
A firewall that runs 24/7 requires a good amount of computing resources. Especially if you are running a complex firewall system, your...
2
0


Tsippi Dach
Aug 9, 202310 min read
How to optimize the security policy management lifecycle
Information security is vital to business continuity. Organizations trust their IT teams to enable innovation and business transformation...
1
0

Avivi Siman Tov
Oct 21, 20214 min read
Change automation: A step-by-step guide to network security policy change management
Avivi Siman-Tov, Director of Product Management at AlgoSec, discusses the benefits of network automation and takes us through a...
1
0


Matthew Pascucci
Sep 9, 20144 min read
Avoid the Traps: What You Need to Know About PCI Requirement 1 (Part 3)
So we’ve made it to the last part of our blog series on PCI 3.0 Requirement 1. The first two posts covered Requirement 1.1...
0
0


Joanne Godfrey
Aug 18, 20142 min read
Firewall migration tips & best practices
It goes without saying that security is the cornerstone of any organization today. This includes ensuring access to corporate data is...
4
0


Matthew Pascucci
Jul 15, 20143 min read
Removing insecure protocols In networks
Insecure Service Protocols and Ports Okay, we all have them… they’re everyone’s dirty little network security secrets that we try not to...
1
0


Prof. Avishai Wool
Nov 26, 20132 min read
To NAT or not to NAT – It’s not really a question
NAT Network Security I came across some discussions regarding Network Address Translation (NAT) and its impact on security and the...
0
0


Matthew Pascucci
Nov 12, 20133 min read
How to secure your LAN (Local Area Network)
How to Secure Your Local Area Network In my last blog series we reviewed ways to protect the perimeter of your network and then we took...
2
0


Sam Erdheim
Feb 19, 20133 min read
NGFW vs UTM: What you need to know
Podcast: Differences between UTM and NGFW In our recent webcast discussion alongside panelists from Fortinet, NSS Labs and General...
5
0
bottom of page