• Sponsor Resources
  • Editorial Resources
  • Classrooms
    • Hybrid Cloud Security
    • Integrating SIEM and Incident Response
    • Targeted Attacks
    • Application Security
    • IoT Security
    • Enterprise IAM
    • Endpoint Security Controls

Lesson 1:


Burke describes why it's vital infosec pros adapt their firewall strategy to their specefic application and infrastructure.

Your next generation of firewalls

Lesson 2:


In this presentation, John Burke discusses why traditional firewalls are inadequate in today’s threat landscape and explains why next-generation firewalls are more application and identity aware, content sensitive and open to collaboration.

The new enterprise firewall:
Features and futures

Lesson 3:


To be able to call your new firewall 'next generation,' it must have certain advanced firewall capabilities. Learn what these are in this tip.

What an advanced firewall must have to be truly 'next generation'

Lesson 4:


Next-generation firewalls can block common yet dangerous SQL-injection and buffer-overflow attacks. Learn how an NGFW stops application-layer attacks.

How a Next-Generation Firewall Prevents Application-Layer Attacks

Lesson 5:


Burke countdowns to the top features to look for when purchasing a next-generation firewall. The discussion focuses on performance, identity and context awareness, flexibility, cost and more.

Top features in a next-generation firewall

Quiz:


Take this brief quiz to test your knowledge of the issues covered in the lessons that make up our classroom on next-generation firewalls

Next-generation firewalls: Quiz

Next-generation firewalls: Breaking through the hype

This SearchSecurity School cuts through the marketing jargon to help you understand what a next-generation firewall can provide and determine which next-generation firewall features best suit your needs. Since this is a rapidly evolving area, there’s no clear feature set established as a baseline—this school will help you build your rubric for evaluating and comparing current offerings.

TOP

John Burke
CIO and principal research analyst, Nemertes Research

John Burke is CIO and principal research analyst with Nemertes Research. With nearly two decades of technology experience, he has worked at all levels of IT, including end-user support specialist, programmer, system administrator, database specialist, network administrator, network architect and systems architect. He has worked at The Johns Hopkins University, The College of St. Catherine, and the University of St. Thomas.



Sponsor Resources

From the start, the Fortinet vision has been to deliver broad, truly integrated, high-performance security across the IT infrastructure. We provide top-rated network and content security, as well as secure access products that share intelligence and work together to form a cooperative fabric. Our unique security fabric combines purpose-built ASICs, an intuitive operating system, and applied threat intelligence to give you proven security, exceptional performance, and better visibility and control--while providing easier administration.

Learn More
  • Internal Segmentation Firewall

  • Fortinet 2016 Predictions for the Evolving Threat Landscape

  • Countering Evolving Cyber Threats

  •  Wireless Security Survey 2016




Editorial Resources

About SearchSecurity.com

IT security pros turn to SearchSecurity.com and Information Security Magazine Online for the information they require to keep their corporate data, systems and assets secure. We're the only information resource that provides immediate access to breaking industry news, virus alerts, new hacker threats and attacks, security certification training resources, security standard compliance, webcasts, white papers, podcasts, Security Schools, a selection of highly focused security newsletters and more -- all at no cost. Nowhere else will you find such a highly targeted combination of resources specifically dedicated to the success of today's IT-security professional.

Learn More
  • How to conduct a next-generation firewall evaluation

  • Comparing the best NGFWs on the market

  • Using a VMware firewall as part of a defense-in-depth strategy

  • How to prevent firewall failures with proper testing and maintenance


Follow Us

18.4k
8.7k
3.9k

Contact Us

  • info@TechTarget.com
  • 275 Grove Street
    Newton, MA 02466
  • @TechTarget
  • (888) 274-4111