CHAPTER 26
GATEWAY SECURITY DEVICES
David Brussin and Justin Opatrny
26.1.1 Changing Security Landscape
26.1.2 Rise of the Gateway Security Device
26.1.3 Application Firewall: Beyond the Proxy
26.2.1 Changing Network Models
26.3 NETWORK SECURITY MECHANISMS
26.3.2 Personal and Desktop Agents
26.4.1 Screened Subnet Firewall Architectures
26.4.2 Gateway Protection Device Positioning
26.4.3 Management and Monitoring Strategies
26.5 NETWORK SECURITY DEVICE EVALUATION
26.5.1 Current Infrastructure Limitations
26.5.2 New Infrastructure Requirements
26.5.8 Managed Security Service Providers
26.1 INTRODUCTION.
The firewall has come to represent both the concept and the realization of network and Internet security protections. Due to its rapid acceptance and evolution, the firewall has become the most visible of security technology throughout the enterprise chain of command. In distinct contrast with virtually any other single piece of technology, there is not likely to be a chief executive officer in this country who cannot say a word or two about how firewalls are used to protect enterprise systems and data.
The firewall, as originally devised, was intended to allow certain explicitly authorized ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.