Press "Enter" to skip to content

Posts published in “Security”

Cisco IOS Internet Key Exchange version 1 (IKEv1) Vulnerability and Fix


Cisco IKEv1 is still popular in VPN configuration. Most of my vpn configuration is based on IKE v1 although there are more demands for v2.  I had a post “Cisco Router IKE v2 Site to Site IPSec VPN Configuration” to quickly show what the difference is between v1 and v2, and how to do v2 configuration.  Recently some vulnerabilities scan…

NSS Labs NGFW Security Value Map Report (2017, 2016, 2014, 2013, 2012, 2011)


  It is good to compare with Gartner Magic Quadrant for Enterprise Network Firewall (2017, 2016, 2015, 2014, 2013, 2011, 2010) or Gartner Magic Quadrant for UTM (2017, 2016, 2015, 2014, 2013, 2012, 2010,…) End users are finding that NGFWs are no longer as limiting in their performance or capability trade-offs as they once were. NSS Labs discovered that many enterprises are choosing…

Gartner Magic Quadrant for Enterprise Network Firewall (2017, 2016, 2015, 2014, 2013, 2011, 2010)


Based on Gartner’s definition, the enterprise network firewall ” is composed primarily of purpose-built appliances for securing enterprise corporate networks. Products must be able to support single-enterprise firewall deployments and large and/or complex deployments, including branch offices, multitiered demilitarized zones (DMZs) and, increasingly, the option to include virtual versions for the data center. Customers should also have the option to…

Gartner Magic Quadrant for Unified Threat Management (2017, 2016, 2015, 2014, 2013, 2012, 2010,…)


Gartner defines the unified threat management (UTM) market as multifunction network security products used by small or midsize businesses (SMBs) (< 1000 employees). 2017 Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls) Not much changes from 2016. 2017 Gartner Magic Quadrant for Unified Threat Management (SMB Multifunction Firewalls)

Gartner Magic Quadrant for Intrusion Detection and Prevention Systems (2017, 2015, 2013, 2012, 2010 …)


According to Gartner, “The network intrusion prevention system market has undergone dynamicevolution, increasingly being absorbed by next-generation firewall placements. NextgenerationIPSs are available for the best protection, but the IPS market is being pressured by the uptake ofadvanced threat defense solutions. This Magic Quadrant focuses on the market for stand-alone IDPS appliances; however, IDPS capabilities are also delivered as functionality in…

Real-Time Cyber Attack Threat Map


More and more security companies use a webpage to show their monitored global security events such as the  Live Status of Cyber Attacks being launched from where and who is the target of that attack. It is become interesting by watching those websites. Actually those are not games but actually happening globally. 1.  Kaspersky CYBERTHREAT REAL-TIME MAP 2. Check Point Live…

Ransomware Locked Files on My Test Machine


One of my test machines which I am using to download and test software from Internet was hit by Ransomware recently. Check out what it did to my machine. In most computer folders including c driver and d driver, even on the desktop, there are three following files which obviously is from hackers who is asking for money to decrypt…

How Firewalls (Security Gateways) Handle the Packets? (Traffic Flow)


Different firewall (security gateway) vendor has different solution to handle the passing traffic. This post compiles some useful Internet posts that interpret major vendors’ solutions including:1. Checkpoint2. Palo Alto3. Fortigate4. Cisco5. Juniper6. F5 1. Checkpoint Firewall Packets Flow: (Source: How to use fw monitor 10-Jul-2003) Note: Checkpoint can define destination NAT happens at client side (default) or server side. Source…

Gartner Magic Quadrant for Mobile Data Protection (2015, 2014, 2013, 2012, 2011…, 2006)


According to Gartner, “Mobile Data Protection (MDP) systems and procedures are needed to protect business data privacy, meet regulatory and contractual requirements, and comply with audits.” Additionally, “Most companies, even if not in sensitive or regulated industries, recognize that encrypting business data is a best practice.” 2015 Magic Quadrant for Mobile Data Protection Solutions 2015 2014 Checkpoint is in the…