firewall
-
Blog
What Is a Host Based Firewall and Is it Secure Enough?
A host-based firewall is installed and run on a single device, like a laptop, cell phone, or server. These firewalls are tailored to individual devices so they can monitor and control its specific traffic — as opposed to network-based firewalls, which protect an entire network of devices. Most consumer devices come with host-based firewalls pre-installed. If you use an HP…
Read More » -
Blog
The 6 Tradeoffs Between a Stateful vs Stateless Firewall
A stateful firewall keeps track of the state of network connections. A stateless firewall does not. Although the difference between a stateful vs stateless firewall is relatively simple, picking one may not be as straightforward. The state of a network connection refers to its status, whether a connection is being established, actively transferring data, or closing. Stateful firewalls keep track…
Read More » -
Blog
5 Reasons to Use a Stateless Firewall (+3 Key Downsides)
In networking, “state” refers to the context or session data of a current network connection. A stateful firewall, therefore, keeps track of the state of each connection passing through it, while a stateless firewall does not. Although they may sound less restrictive, stateless firewalls are incredibly useful for securing home and business networks. They use ACLs (Access Control Lists) to…
Read More » -
Blog
5 Reasons a Stateful Firewall Is a Must-Have for Business
A stateful firewall is capable of tracking the state of active connections between devices on the network. It logs when devices are requesting data, sending data, or closing the connection. With this context, a stateful firewall knows whether incoming data is part of an established, legitimate session or if it’s an unsolicited request that needs to be blocked. This allows…
Read More » -
Blog
Palo Alto Networks warns of firewall hijack bugs with public exploit
Palo Alto Networks warned customers today to patch security vulnerabilities (with public exploit code) that can be chained to let attackers hijack PAN-OS firewalls. The flaws were found in Palo Alto Networks’ Expedition solution, which helps migrate configurations from other Checkpoint, Cisco, or supported vendors. They can be exploited to access sensitive data, such as user credentials, that can help…
Read More » -
Blog
What is a Router Firewall and How Does it Work?
Your home Wi-Fi network could be the gateway hackers are looking for. With the surge of internet-connected devices in our homes, ensuring network security is no longer optional. A router firewall stands as a vital defender, but what exactly is it, and how does it protect you? In this guide, we uncover what a router firewall is and answer all…
Read More » -
Blog
What is firewall as a service (FWaaS)?
Brazil’s Public Defender’s Office for Human Rights is one of the many organizations that has jumped on the firewall bandwagon and it’s easy to see why. Thanks to its hybrid mesh firewall setup, the office faced 99% fewer suspicious emails and practically non-existent security incidents that once climbed to 500+ a year. It’s not just a one-off success story —…
Read More »