The Ultimate Guide to Firewall
2024 edition
Overview
Like its real-world namesake, a firewall in computer technology is a structure preventing unwanted incursion. The real world one slows or stops fire, the virtual one slows or stops hackers and malware as a barrier between the internet and your private network. Firewalls can be physical devices monitoring and filtering traffic going into or out of the network, or it can be a software product or service. A Next Gen firewall performs essentially the same task, but with added intelligence – including application awareness and control, integrated intrusion prevention, and threat intelligence.
Analyst reports
Gartner Peer Insights on Breach Prevention
Fastly named Gartner’s top choice for Cloud WAAP for si...
3 days ago
IDC on Network Security
Cisco launches Hypershield for AI-driven security upgra...
Last month
Forrester Research on Breach Prevention
Radware to provide advanced DDoS protection for Asian t...
Last month
Forrester Research on Managed Services
Radware unveils latest version of AI-based Bot Manager
Last month
ABI Research on IoT Security
Cyber threats prompt UK industries to prioritise cybers...
Thu, 28th Mar 2024
Expert columns
By Jonathan Tanner of Barracuda Networks, Inc.
The remote desktop tools most targeted by attackers in ...
Yesterday
By Adam Khan of Barracuda XDR
How attackers target security blind spots: Three real-l...
Last month
By Gabriel Moss of Barracuda Networks Inc
How attackers weaponise generative AI through data pois...
Last month
By Matt Caffrey of Barracuda Australia
How to defend your business against AI-powered ransomwa...
Last month
By Charles Smith of Barracuda Networks
Data tampering is an underrated threat — get your backu...
Mon, 25th Mar 2024
More expert columns
By Wayne Phillips of SentinelOne
From investment to impact: Unlocking cybersecurity valu...
Thu, 14th Mar 2024
By Matt Caffrey of Barracuda Australia
Five ways AI is already strengthening cyber-defences
Tue, 12th Mar 2024
By Michelle Liao of Watchguard Technologies
IWD 2024: How taking centre stage professionally encour...
Fri, 8th Mar 2024
By Lucas Randall of PaperCut
Why is Printing the Last to Reach the Cloud?
Thu, 22nd Feb 2024
By Amit Bhardwaj of Juniper Networks
Setting a new standard for sustainability, performance ...
Thu, 22nd Feb 2024
By Ilan Rubin of Wavelink
Why businesses need a virtual firewall for optimal clou...
Tue, 20th Feb 2024
Top players
Recent news
About Network Infrastructure
Ip.Glass first in Australia to achieve all Fortinet spe...
Yesterday
About Data encryption
Ransomware attack costs on Australian firms soar, revea...
2 days ago
About Ransomware
Akamai Technologies unveils Guardicore platform for imp...
2 days ago
About Bluetooth
HPE reveals Wi-Fi 7 APs with 30% more capacity over riv...
3 days ago
About Cyber Risk
Barracuda report explores challenges in managing cyber ...
4 days ago
More expert columns
By Ilan Rubin of Wavelink
Why businesses need a virtual firewall for optimal clou...
Tue, 20th Feb 2024
By Tushar Spotlight of Application Security
Threat spotlight - How attackers are targeting your web...
Thu, 8th Feb 2024
By Matt Caffrey of Barracuda Australia
Advanced security tools can help bridge the cyber-skill...
Mon, 5th Feb 2024
By Siroui Mushegian of Barracuda Networks
The data loss that will hurt your business the most
Mon, 29th Jan 2024
By Uri Dorot of Radware
Top seven client-side threats to app security in 2024
Mon, 8th Jan 2024
By Fleming Shi of Barracuda
The risks and rewards of AI: A Year After ChatGPT's Ris...
Mon, 4th Dec 2023
Even more expert columns
By Fleming Shi of Barracuda
The risks and rewards of AI: A Year After ChatGPT's Ris...
Mon, 4th Dec 2023
By Ilan Rubin of Wavelink
How businesses can transition to a single vendor SASE s...
Thu, 30th Nov 2023
By Paul Crighton of Barracuda Networks
Festive season alert: Rising cybercrime threatens busin...
Wed, 29th Nov 2023
By Jonathan Hatchuel of Gigamon
Why East-West traffic security is so important
Wed, 22nd Nov 2023
By Anthony Daniel of WatchGuard Technologies
The increasing impact of Artificial Intelligence on cyb...
Mon, 13th Nov 2023
By Etuate Cocker of Fortinet
Is it wise to put all your security solutions in one cy...
Wed, 25th Oct 2023
By Prakash Sinha of Radware
How application security reinforces an identity-as-a-pe...
Thu, 19th Oct 2023
By Tim O’Neill of BitTitan
Why it’s vital to take a holistic approach to cybersecu...
Tue, 17th Oct 2023
By Mike Hicks of Cisco ThousandEyes
Securing access to corporate systems, but not at the co...
Mon, 16th Oct 2023
By Ilan Rubin of Wavelink
How the rise of the hybrid mesh firewall is revolutioni...
Wed, 4th Oct 2023
More news
About Distributed Denial of Service
Radware unveils AI-powered DNS DDoS protection solution
4 days ago
About Threat intelligence
Yokogawa collaborates with Fortinet for secure IT/OT in...
4 days ago
About Digital Transformation
Australian businesses fast-track Microsoft cloud adopti...
Last week
About Ransomware
'Junk gun' ransomware: New low-cost cyber threat target...
Last week
About Threat intelligence
Fortinet upscales OT & CI cybersecurity in Asia-Pacific
Last week
Even more news
About Network Infrastructure
Fortinet recognised as Challenger in Gartner's 2024 Mag...
Last month
About Network Security
Absolute Security focuses on cyber resilience in compan...
Last month
About Cloud Services
Fortinet celebrates partners' achievements at Australia...
Last month
About Gateway
Tetrate debuts Enterprise Gateway for Envoy within Kube...
Last month
About Network Security
Datacom opens new tech integration centre in South Aust...
Last month
Job moves
Move at Ericsson
Enea appoints Osvaldo Aldao as new Chief Product & Tech...
Thu, 21st Mar 2024
Move at WatchGuard Technologies
Kyocera Australia becomes second Platinum Partner of Wa...
Wed, 20th Mar 2024
Move at Microsoft
One NZ appoints Nick Quin as new Head of Public Sector
Mon, 11th Mar 2024
Move at WatchGuard Technologies
WatchGuard appoints Zayed Alji as new Partner Manager i...
Thu, 29th Feb 2024
Move at Sophos
Sean Muirhead named Chief Product Officer at Logpoint
Wed, 7th Feb 2024
Other guides
You can read other related guides from Breach Prevention, Network Security, Network Management, Cybersecurity, and Cloud Services.
Powered by