Press "Enter" to skip to content

Posts published in “Security”

NSS Labs NGFW Security Value Map Report (2017, 2016, 2014, 2013, 2012, 2011)

0

  It is good to compare with Gartner Magic Quadrant for Enterprise Network Firewall (2017, 2016, 2015, 2014, 2013, 2011, 2010) or Gartner Magic Quadrant for UTM (2017, 2016, 2015, 2014, 2013, 2012, 2010,…) http://www.51sec.org/page/3/ End users are finding that NGFWs are no longer as limiting in their performance or capability trade-offs as they once were. NSS Labs discovered that many enterprises are choosing NGFW over traditional firewalls for a variety of reasons without feeling that they are compromising on features or performance.…

Gartner Magic Quadrant for Enterprise Network Firewall (2017, 2016, 2015, 2014, 2013, 2011, 2010)

0

Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and large and/or complex deployments, including branch offices, multitiered demilitarized zones (DMZs) and, increasingly, the option to include virtual versions for the data center. Customers should also have the option to deploy versions within Amazon Web Services (AWS) and Microsoft Azure public cloud environments. These products are accompanied by highly scalable…

Gartner Magic Quadrant for Unified Threat Management (2017, 2016, 2015, 2014, 2013, 2012, 2010,…)

1

Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2017 Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) Not much changes from 2016. 2017 Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls)

Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (2017, 2015, 2013, 2012, 2010 …)

1

According to Gartner, “The network intrusion prevention system market has undergone dynamicevolution, increasingly being absorbed by next-generation firewall placements. NextgenerationIPSs are available for the best protection, but the IPS market is being pressured by the uptake ofadvanced threat defense solutions. This Magic Quadrant focuses on the market for stand-alone IDPS appliances; however, IDPS capabilities are also delivered as functionality in other network security products. Network IDPSs are provided within a next-generation firewall (NGFW), which is the evolution of enterprise-class network…

Real-Time Cyber Attack Threat Map

0

More and more security companies use a webpage to show their monitored global security events such as the  Live Status of Cyber Attacks being launched from where and who is the target of that attack. It is become interesting by watching those websites. Actually those are not games but actually happening globally. 1.  Kaspersky CYBERTHREAT REAL-TIME MAP 2. Check Point Live Cyber Attack Threat Map 3. FireEye Cyber Threat Map 4. Fortinet Threat Map 5. Norse Attack Map

Ransomware Locked Files on My Test Machine

0

One of my test machines which I am using to download and test software from Internet was hit by Ransomware recently. Check out what it did to my machine. In most computer folders including c driver and d driver, even on the desktop, there are three following files which obviously is from hackers who is asking for money to decrypt your files.: +REcovER+gdqvd+.txt +REcovER+gdqvd+.html +REcovER+gdqvd+.png     Here is full content from txt file +REcovER+gdqvd+.txt“ NOT YOUR LANGUAGE? USE https://translate.google.com …

How Firewalls (Security Gateways) Handle the Packets? (Traffic Flow)

3

Different firewall (security gateway) vendor has different solution to handle the passing traffic. This post compiles some useful Internet posts that interpret major vendors’ solutions including:1. Checkpoint2. Palo Alto3. Fortigate4. Cisco5. Juniper6. F5 1. Checkpoint Firewall Packets Flow: (Source: How to use fw monitor 10-Jul-2003) Note: Checkpoint can define destination NAT happens at client side (default) or server side. Source NAT always at outbound, and ACL is checked before NAT. More details are on SK85460 Also you could check the…

Gartner Magic Quadrant for Mobile Data Protection (2015, 2014, 2013, 2012, 2011…, 2006)

0

According to Gartner, “Mobile Data Protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.” Additionally, “Most companies, even if not in sensitive or regulated industries, recognize that encrypting business data is a best practice.” 2015 Magic Quadrant for Mobile Data Protection Solutions 2015 2014 Checkpoint is in the leader Quadrant for 8 years in a row. McAfee and Sophos are also in the leaders quadrant since 2008 2013…

My Top Network Security Tools

0

I listed some of my favorite and useful Internet websites and network tools in previous post which has been used in my daily IT life. There are some network security related tools I am using at my environment. This post is a summarize for those tools and also I am trying to extend this list to add more later. Online Security Scanning Qualys FreeScan – Online Vulnerability Scan can accurately scan your network, servers, desktops or web apps for security vulnerabilities.…

Troubleshooting Java HTTPS Security Warning Message

0

One of our Internal Website is always having a Security Warning message when using Internet Explorer https to it, but this message is not showing when using Google Chrome. Symptoms: As following screenshot shows, a pop-up window will ask you “Do you want to Continue? The connection to this website is untrusted”.  Click More Information link:  The Warning message will warm you a Risk; “This application will run with unrestricted access which may put your computer and personal information at…