Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Applications
    • Applications
    • Cybersecurity
    • Networking

    Network Firewall Management Tools from Third-Party Vendors Gain Ground Among Enterprises

    Written by

    Brian Prince
    Published February 25, 2009
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Five years after spinning out of FishNet Security, officials at Secure Passage say they have watched the challenge of managing firewall policies mushroom.

      In a space where larger vendors such as Cisco, Juniper Networks and Check Point Software Technologies loom large, third-party vendors like Secure Passage are finding a niche by offering enterprises deeper visibility into their firewall policies.

      The company announced the availability of a new version of its flagship FireMon product Feb. 24. Designed to augment existing firewall administration tools from the Junipers of the world, the product competes against offerings from companies such as AlgoSec, Exaprotect and Tufin Technologies.

      Some analysts say these companies are capitalizing on a small but growing market due to a lack of solid management and auditing tools from traditional firewall vendors.

      “Generally, firewall vendors don’t have an advantage here,” said Forrester Research analyst John Kindervag. “They don’t have the rules correlation engines in their products. Cisco has zero ability here. They have failed in the firewall management area, let alone the firewall auditing space.”

      Gartner analyst Greg Young agreed that many of the consoles and reporting tools from the firewall vendors are found lacking.

      “As long as the firewall vendors continue to hold back on these features, third-party companies will help enterprises manage firewalls from multiple vendors, and stretch out the lifespan of firewalls by improving inefficient rule sets,” he said.

      To hear Secure Passage tell it, enterprises today are challenged by rising complexity in their firewall policies due to outdated and redundant rules. The complexity, Secure Passage CTO Jody Brazil noted, has long-term implications on firewall policy management.

      “At some point, it becomes too difficult to simply manage what exists; that clean-up becomes overwhelming,” he said. “Rules that are now obsolete become difficult to identify and simply remain in operation beyond their productive life.”

      “The result is … decreased performance and unnecessary security risk [such as] open access that is not needed for legitimate business purpose,” Brazil concluded.

      To augment the management capabilities of the firewall vendors themselves, Secure Passage provides analysis tools that evaluate how firewall policies process specific traffic, what rule will be used, and how and when rules are triggered. In addition, the company provides reports that can be used to determine regulatory compliance.

      Compliance with the Payment Card Industry Data Security Standard (PCI DSS) is the biggest driver of the market, Kindervag said, adding that the rule requires enterprises to review firewall and router configurations.

      “It is nearly impossible to manually audit firewall and router rules and policies,” Kindervag said. “To do it properly, you need to correlate the rule base to the log files to see what rules are being fired and which are just open holes into the network. Most companies are not even addressing this issue. I regularly see companies who have never reviewed their firewall rule sets.”

      Brian Prince
      Brian Prince

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.