Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
This is Part 3 of our blog series about NG-Firewalls. Start at Part 1 here.Part 3: Challenges of the Typical NGFWWhat good is a malicious verdict on something that had already penetrated the system?There is no system in the world that can stop 100% o...
This is Part 2 of our blog series about NG-Firewalls. Read Part 1 here.Part 2: Enter Threat-Focused NG-FirewallWhat does a Threat-focused NG-Firewall do differently? Just about everything. Let’s compare the most popular NGFW systems on the market (ty...
Part 1: Rude AwakeningLet us begin with some context in the form of a story.I live in a very bad part of town and I am always worried that my car is going to get stolen or broken into. So, I just invested over a thousand bucks in this awesome vehicle...