Remove Firewall Remove Mobile Remove Network Security
article thumbnail

Back to the Future of Firewall

Cisco Security

As a network and workload security strategy leader, I spend a lot of time thinking about the future of the good old network firewall. Spoiler alert: I’m not going to join the cool club of pronouncing the firewall dead. Insert Your Firewall Here. How this insertion happens is changing quite rapidly, though.

Firewall 140
article thumbnail

Network Security Architecture: Best Practices & Tools

eSecurity Planet

Network security architecture is a strategy that provides formal processes to design robust and secure networks. Effective implementation improves data throughput, system reliability, and overall security for any organization.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Building a scalable RAVPN architecture in Oracle Cloud Infrastructure using Cisco Secure Firewall

Cisco Security

With Cisco Secure Firewall, organizations are able to build a scalable RAVPN architecture on OCI, providing employees secure remote access to their organization’s resources from any location or endpoint. Architects can still design a scalable architecture using cloud components like Oracle’s Network Load Balancer (NLB) and DNS.

Firewall 130
article thumbnail

Cisco Secure Firewall: Sometimes, updates are great news

Cisco Security

I distinctly remember my desktop and mobile updates that slowed my systems to a crawl. Which is a pity, when a treasured custom-built system can no longer supported the latest updates, compromising its security, or a smart phone dialer needs 5 seconds to open for a phone call. Secure Firewall Threat Defense 7.0

Firewall 116
article thumbnail

What Is a Host-Based Firewall? Definition & When to Use

eSecurity Planet

A host-based firewall is installed directly on individual networked devices to filter network traffic on a single device by inspecting both incoming and outgoing data. Larger enterprises use this to manage the spread of malware throughout a network in the event that one device is infected.

Firewall 110
article thumbnail

Top Five Risks of Perimeter Firewalls and the One Way to Overcome Them All

Tech Republic Security

Firewalls have been an integral part of the enterprise network architecture. But with the shift to digital business models the once-sturdy firewall has gone from a security staple to a security risk. Read more to learn the five major risks brought on by legacy firewalls in a world of cloud and mobile.

Firewall 118
article thumbnail

Cisco Secure Firewall Threat Defense Virtual now supported on Cisco HyperFlex

Cisco Security

With the Cisco Secure platform approach, we are helping you take steps to achieve radically simplified security across your organization. Today, we are driving simplified security to your hyperconverged infrastructure (HCI), delivering support for Cisco Secure Firewall Threat Defense Virtual (formerly FTDv/NGFWv) on Cisco HyperFlex.

Firewall 122