September 11, 2018 | Ask-An-Expert | Firewalls, NGFW
Some countries are notorious for disseminating malicious traffic. In this Ask-an-Expert written response, IANS Faculty Dave Shackleford says geo-blocking can help limit exposure, and he recommends some tools to ease the process.
Perimeter security is critically important. This high-level checklist provides best practice steps to keep your perimeter and organization secure.
What are the pros and cons of firewall rule compliance tools like FireMon? In this Ask-an-Expert written response, IANS Faculty Jake Williams says the tools are great for ensuring firewall rules match policy, but he cautions that creating an audit model and chasing down stale rules can eat up staff resources.
What exactly is zero trust and how viable is it as a security strategy? In this report, IANS Faculty Dave Shackleford defines zero trust, explains why today’s cloud-based workloads require a dynamic zero trust security architecture and provides an overview of the current vendor marketplace.