Firewalls: Barbarians at the Gates
As they are plotting against you and
going in for the attack, what is your strategy? How well are
you at keeping them out? Are you putting too much stock in
your firewall? According to Mick Johnson, a product
marketing manager with Sensory Networks, "The definition of
a firewall has changed over the years, compounding this
issue, but most commercial 'firewalls' out there just don't
dig deep enough into the network traffic to provide any real
security. They'll certainly block a lot of basic attacks,
but as soon as someone tunnels an exploit over HTTP or
targets an older SMTP server, an enterprise can be
considered completely unprotected (sensorynetworks.com)." Is
one firewall enough to protect your network traffic?
Actually, when it comes to computer networks, one
firewall is not enough. "There is no one-size-fits-all
security solution, and most IT managers spend a large chunk
of time creating multi layered, process-driven security
strategies. . . ." as found in Elizabeth Millard's article
called Weighing in on Security Services. Each firewall is
different, and since there is such a wide range of firewalls
to choose from (software programs to hardware devices), it's
important to have the firewall protection you are looking
for. For instance, irregardless of what firewall(s) you are
using, if you have open unattended ports, you are
undermining your
firewall(s).
Unfortunately, there is no single way
for the barbarians to intrude into your computer network.
Computer viruses are another huge predicament for networks
today. Since there are 25 to 35 new viruses occurring
everyday on the Internet, your virus software should be
scheduled to update on a daily basis.
Genesis Global, Inc. provides a wide variety of security
equipment. Cisco hardware and accessories, as well as other
leading network equipment manufacturers, have much to offer.
Cisco's PIX Firewalls and Adaptive Security Appliances
brilliantly transform traditional network management into
state-of-the-art secure communication networks where worms,
hackers, and other threats are proactively controlled
through the combination of firewall, application security,
and intrusion prevention services.
To adequately secure your computer
network, part of covering your basis is to hire a security
consultant and have him or her take an assessment of your
network vulnerabilities. Once you know where the gaps are in
your software, firewall appliance, or business policies, you
will be in a better position to fight the ongoing war of
keeping the barbarians at the gates!
When
you are ready to improve your network system, don't forget
about Genesis Global's wide selection of new and used
network equipment. If you need help in upgrading your
security for your business network, the professionals at
Genesis Global are happy to help. Give us a call at
1-800-908-9665 or email
sales@genesisglobalinc.com
and let us help you reduce your network vulnerabilities.
About Genesis Global's Author: |
Debbie Jensen, an expert
writer for business and technology for Genesis Global,
has a Bachelor's Degree in Visual Communication
(Multimedia). With her twenty year history of creative
expressions and formalized study of Information
Technology of digital print/web design and development,
she is now publishing articles about networking for
Genesis Global. | |
Give Genesis Global's Account Sales Managers a call
at:
1-800-908-9665
The Best Business Connection
"Cisco believes the network is the
platform for organizations to connect with their
constituents and for individuals to connect with each
other," said Dan Scheinman, senior vice president and
general manager of the Cisco Media Solutions Group" (CMSG).
Used Cisco Hardware
Used Cisco Accessories
Used EqualLogic
Used Foundry
Used Juniper
Used Brocade
Used Marconi
Used 3Com
Used Riverstone
Used Nortel
Used 3Com
Call 1-800-908-9665 and our Sales Accounts Managers and
about ReNew!
|
|
|