Quantcast
Channel: Rational Survivability » Unified Threat Management (UTM)
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Unified Risk Management (URM) and the Secure Architecture Blueprint

Gunnar once again hits home with an excellent post defining what he calls the Security Architecture Blueprint (SAB): The purpose of the security architecture blueprint is to bring focus to the key...

View Article



Image may be NSFW.
Clik here to view.

Clean Pipes – Less Sewerage or More Potable Water?

Jeff Bardin over on the CSO blog pitched an interesting stake in the ground when he posited "Connectivity As A Utility: Where are My Clean Pipes?" Specifically, Jeff expects that his (corporate?)...

View Article

Image may be NSFW.
Clik here to view.

My IPS (and FW, WAF, XML, DBF, URL, AV, AS) *IS* Bigger Than Yours Is…

Interop has has been great thus far.  One of the most visible themes of this year’s show is (not suprisingly) the hyped emergence of 10Gb/s Ethernet.  10G isn’t new, but the market is now ripe with...

View Article

Image may be NSFW.
Clik here to view.

For Data to Survive, It Must ADAPT…

Now that I’ve annoyed you by suggesting that network security will over time become irrelevant given lost visibility due to advances in OS protocol transport and operation, allow me to give you...

View Article

Image may be NSFW.
Clik here to view.

Profiling Data At the Network-Layer and Controlling It’s Movement Is a Bad...

I’ve been watching what appears like a car crash in slow-motion and for some strange reason I share some affinity and/or responsibility for what is unfolding in the debate between Rory and Rob. What...

View Article


Image may be NSFW.
Clik here to view.

The 4th Generation of Security Devices = UTM + Routing & Switching or New...

That’s it.  I’ve had it.  Again.  There’s no way I’d ever make it as a Marketeer.  <sigh> I almost wasn’t going to write anything about this particular topic because my response can (and probably...

View Article

Image may be NSFW.
Clik here to view.

Consolidating Controls Causes Chaos and Certain Complexity?

Don Weber wrote a post last week describing his thoughts on the consolidation of [security] controls and followed it up with another today titled "Quit Complicating our Controls – UTM Remix" in which...

View Article

Image may be NSFW.
Clik here to view.

Complexity: The Enemy of Security? Or, If It Ain’t Fixed, Don’t Break It…

When all you have is a hammer, everything looks like a nail… A couple of days ago, I was concerned (here) that I had missed Don Weber’s point (here) regarding how he thinks solutions like UTM that...

View Article


Image may be NSFW.
Clik here to view.

New Fortinet Patents May Spell Nasty Trouble For UTM Vendors, Virtualization...

Check out the update below… Were I in the UTM business, I’d be engaging the reality distortion field and speed-dialing my patent attorneys at this point. Fortinet has recently had some very interesting...

View Article


Image may be NSFW.
Clik here to view.

No DNS Disclosure Debacle Here: Stiennon Pens the Funniest Thing I’ve Read in...

Hat tip to Rothman for this. I don’t know if Stiennon is off his meds or simply needed to re-post something from 2001 to meet an editorial quota, but his Network World article titled "The Most...

View Article
Browsing latest articles
Browse All 10 View Live


Latest Images