Skip Links

Firewall & UTM Research Center

Your source for the latest news, opinion, product comparisons and reviews of enterprise firewalls and UTM (unified threat management) tools.

Firewall & UTM News
Why we are losing the cyber security war and what we can do about it
Why are the world’s most IT savvy companies unable to keep attackers out of their networks?
A holistic approach to combating advanced persistent threats
Security researcher Michael Sutton is really concerned. He says most companies haven’t advanced their security strategies to keep pace with today’s...
VMware and Palo Alto team to more quickly secure virtual resources
In connection with its NSX network virtualization software effort, VMware is teaming with Palo Alto Networks to jointly develop a virtualized...
Spike in traffic with TCP source port zero has some researchers worried
A significant increase this weekend in TCP traffic with source port zero detected could be part of reconnaissance efforts in preparation for more...
Sophos takes first step in rolling out cloud security strategy
Sophos today leapt forward with a cloud strategy under which it will deliver integrated management and policy enforcement for its endpoint security...
First Look: NetCitadel threat management platform in beta site
Detecting and stopping stealthy malware designed to steal sensitive information means moving fast. Start-up NetCitadel wants to put its new Threat...
HP rolls out next-gen firewall line, threat-detection service
HP today took the wraps off its Next-Generation Firewall line designed to exert application-level controls and visibility over all traffic related to...
NIST subjects draft cybersecurity framework to more public scrutiny
Following through on an order earlier this year from U.S. President Barack Obama, the National Institute of Standards and Technology (NIST) is...
HyTrust enforces two-person approval for VMware security
Following up on customer feedback from U.S. intelligence agencies, VMware security systems provider HyTrust has updated its virtual security...
Chinese hacker group behind New York Times attack returns with updated tools
The Chinese hacker group that broke into the computer network of The New York Times and other high-profile organizations, including defense...
How hybrid cloud is hastening the demise of traditional firewall security
It's not a new notion, but one that is gaining adherents: Perimeter-based security options like firewalls and access controls just will not cut it...
Cisco-Sourcefire union raises many product overlap questions
Industry watchers are bullish about the $2.7 billion Cisco buyout of security company Sourcefire announced today, but they have plenty of questions...
F5 data center firewall aces performance test
Huge data center, check. Multiple 10G Ethernet pipes, check. Load balancer, check. Firewall? Really? Do network architects need to buy yet another...
How will cloud, virtualization and SDN complicate future firewall security?
The firewall in decades past was mainly the port-based guardian of the Internet. Now vendors are vying to build so-called "next-generation firewalls"...
Cyberattacks the greatest threat to nations, say global execs
Business brass and IT pros around the world believe cyber attacks are a greater threat to their countries than a physical attack, a survey released...
Cisco impresses with first crack at next-gen firewall
When we tested next-generation firewalls last May, at least one important security vendor wasn’t there: Cisco, because they weren’t ready to be...
Shootout results: Best security tools for small business
If you run a small business, you have a lot of choices to protect your network. You can buy a consumer-grade router for less than $50, you can spend...
MIT researchers advance cloud security with end-to-end encryption
University researchers have taken an important step forward on cloud security by proving it's possible for a server to process encrypted data and to...
MIT researchers advance cloud security with end-to-end encyrption
University researchers have taken an important step forward on cloud security by proving it's possible for a server to process encrypted data and to...
McAfee offers business endpoint security suites for broader protection
Aiming to better address the security needs of businesses of all sizes that are facing increasingly complex attacks, McAfee has added two endpoint...