Dos and don'ts for next-gen firewalls

FREE

Become An Insider

Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CITEworld, CSO, Computerworld, InfoWorld, ITworld and Network World. Learn more.

More front-line practicals for choosing and using next-generation firewalls

Plug it in and turn it on? Next-generation firewalls just aren't that simple. Here's advice from the experts on choosing the right device and getting the most it.

Also read the companion special report Next-generation firewalls: In depth.

[ The Web browser is your portal to the world -- as well as the conduit that lets in many security threats. InfoWorld's expert contributors show you how to secure your Web browsers in this "Web Browser Security Deep Dive" PDF guide. ]

DO understand the new management paradigm. Policies and rules are built around applications and users, not just ports and protocols, and will be tightly tied to business practices—authorized and ad hoc—that are very different. However, once the admins get the knack, rule sets will be more streamlined and specific.

Sign up to read this story and other Insider content.

To continue reading, please begin the free registration process or sign in to your Insider account by entering your email address:
Recommended
Join the discussion
Be the first to comment on this article. Our Commenting Policies