Share On


A firewall is a network security software used to maintain, monitor, and control the security of a private network. It establishes a barrier and blocks unauthorized access to or from private networks. It is often employed to prevent unauthorized Web users like hackers or illicit software like viruses and worms from gaining access to private networks connected to the Internet. A firewall may be implemented using hardware, software, or a combination of both and may be purchased as a stand-alone software application.

There are two main types of firewalls namely-

  • Host-based firewall – It is installed on individual servers and monitors incoming and outgoing signals

  • Network-based firewall- This firewall can either be built into the cloud's infrastructure, or it can be a virtual firewall service

Other types of firewalls include-

  • Packet-filtering firewall – It examines packets in isolation and does not know the packet's context

  • Stateful inspection firewall- This type of firewall examines network traffic to determine whether one packet is related to another packet.

  • Proxy firewall- Inspects packets at the application layer of the OSI reference model.

  • NGFW – This next-generation firewall uses a multilayered approach to integrate enterprise firewall capabilities with an intrusion prevention system (IPS) and application control

Improving Firewall Changes :Overcome Process And Complexity Challenges By Focusing On The Firewall

White Paper By: FireMon

How to overcome the challenges of firewall changes? Firewall changes are a constant, but as business grows—changes must be made to the firewall to accommodate the new requirements. These changes present a number of challenges to firewall administrators and can present serious risk to the business. Changes in general, whether to a firewall, router, application or any other part of the...

Best Practices for Selecting a Vulnerability Management (VM) Solution

White Paper By: Qualys

A complete Vulnerability Management (VM) solution can monitor your environment, enabling you to discover devices running in your network, and determine whether they are vulnerable to attack. The VM solution helps you to find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This whitepaper provides insights on the best practices that will save...

SAP Cyber Security in Figures: Global Threat Report 2016

White Paper By: ERPScan

How aware people are about SAP cyber security, regardless of how widely SAP in this region are implemented? This whitepaper shows a high level overview of SAP security in figures so that the problem area is not just theoretically comprehensible but based on actual numbers and metrics – from the information about the number of found issues and their popularity to the number of...

Vulnerability Management Maturity Level Control Security Risk Attacks and Data Breaches

White Paper By: Digital Defense

An organization’s vulnerability management maturity level is related to their ability to drive out security risk from their operations. The purpose of this model is to help organizations gauge their level of maturity with respect to their vulnerability management processes and their security maturity risk level. What truly is vulnerability management? Vulnerability management is a...

SAP Authorization Logic - Where Did it All Go Wrong?

White Paper By: CSI tools

Although SAP Authorization concept has been widely followed in many software development environments, some of the enterprises are still facing issues to understand it. They often think that the purpose of SAP authorization objects is to restrict certain organizational levels and they can protect SAP systems by removing and assigning transaction codes to users.The reality is however...

The Integration of SOPHIA with the People, Process, and Technology: The Convergence and collaboration of perfect arguments

White Paper By: Covenant Security Solutions, Inc

Are you reaping the full benefits of security technology convergence? Using technology alone is a practically impossible and cyber-security protection requires the convergence of physical security and cyber-security. If not, Security Operations and Intelligence Analysis tool can help you do that by securing the integrity of your business data and processes. Download this free white...

follow on linkedin follow on twitter follow on facebook 2018 All Rights Reserved | by: