article thumbnail

Just Released and Ready for Download — Software Firewalls for Dummies

Palo Alto Networks

If you want to protect applications and workloads throughout today’s complex and interrelated environments, you need software firewalls. You can better understand the extensive need and numerous use cases for virtual firewalls, container firewalls and managed cloud firewalls with our essential guide, “ Software Firewalls for Dummies.”

article thumbnail

VM-Series Virtual Firewalls Beat Fortinet Fortigate in Miercom Testing

Palo Alto Networks

The lift-and-shift of applications to the cloud has accelerated the adoption of virtual firewalls over the past few years. Virtual firewalls have evolved with higher performance and flexibility for private, public and multi-cloud tenants. So, how does our virtual firewall performance stack up against the competition?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Firewall Security: Is a Secure, Firewall-less Network Possible? Perhaps, But Why Would You?

Firemon

Just three years ago, technology headlines were rife with articles stating that the firewall was obsolete. And maybe that prophecy would have come true if we were stuck with the same old firewalls that could only perform simple packet filtering. Learn how FireMon Firewall Security solves your most complex problems.

article thumbnail

From Phishing to Firewalls: Solving Security with AI

Palo Alto Networks

David Szabo, who conducted the interview, raises an interesting point about the computational requirements of running machine learning models on firewalls. Firewalls need to handle massive volumes of data, making memory optimization essential. I'm most proud of machine learning in the firewall.

article thumbnail

How To Configure Squid As An Egress Gateway

Xebia

This blog configures Squid Proxy as an egress gateway to filter web traffic. Firewalls filter traffic based on attributes such as IP address, protocol and domain name. The available attributes depend on the firewall’s operating layer. The higher the layer, the more advanced (and costly) the firewall.

Firewall 147
article thumbnail

How customers can save money during periods of economic uncertainty

CIO

This is the second installment in our two-part blog series highlighting the ways in which Zscaler helps organizations overcome the challenges of perimeter-based architectures to deliver superior economic value. Learn from businesses like yours Discover more ways Zscaler provides superior economic value by reading Part 1 of this blog series.

Firewall 212
article thumbnail

How to Protect Your Azure App with a Web Application Firewall

Modus Create

In these blog posts, we will be exploring how we can stand up Azure’s services via Infrastructure As Code to secure web applications and other services deployed in the cloud hosting platform. To start with, we will investigate how we can stand up Web Applications Firewall (WAF) services via Terraform.