Plug it in and turn it on? Next-generation firewalls just aren't that simple. Here's advice from the experts on choosing the right device and getting the most it.
Also read the companion special report Next-generation firewalls: In depth.
[ The Web browser is your portal to the world -- as well as the conduit that lets in many security threats. InfoWorld's expert contributors show you how to secure your Web browsers in this "Web Browser Security Deep Dive" PDF guide. ]
DO understand the new management paradigm. Policies and rules are built around applications and users, not just ports and protocols, and will be tightly tied to business practices—authorized and ad hoc—that are very different. However, once the admins get the knack, rule sets will be more streamlined and specific.
To continue reading this article register now