{% set baseFontFamily = "Open Sans" %} /* Add the font family you wish to use. You may need to import it above. */

{% set headerFontFamily = "Open Sans" %} /* This affects only headers on the site. Add the font family you wish to use. You may need to import it above. */

{% set textColor = "#565656" %} /* This sets the universal color of dark text on the site */

{% set pageCenter = "1100px" %} /* This sets the width of the website */

{% set headerType = "fixed" %} /* To make this a fixed header, change the value to "fixed" - otherwise, set it to "static" */

{% set lightGreyColor = "#f7f7f7" %} /* This affects all grey background sections */

{% set baseFontWeight = "normal" %} /* More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set headerFontWeight = "normal" %} /* For Headers; More than likely, you will use one of these values (higher = bolder): 300, 400, 700, 900 */

{% set buttonRadius = '40px' %} /* "0" for square edges, "10px" for rounded edges, "40px" for pill shape; This will change all buttons */

After you have updated your stylesheet, make sure you turn this module off

How The Firewall Appliance Continues to Grow and Change

by Carl Weinschenk on September 10, 2015

Meraki FirewallThe firewall business continues to expand. In late August, the Dell’Oro Group released a report indicating that during the second quarter enterprise class firewalls sales rose more than 10 percent against the year-ago quarter. They almost reached the $1 billion mark. Unified Threat Mangement devices optimized for edge applications grew significantly as well.

 

meraki security appliance The category is changing as well. This very nicely done story at Computerworld does a few things simultaneously. It illustrates how the next generation in-line Unified Threat Management Device technology confronts threats – not just reports upon them. It clearly describes how necessary these hardware and software devices are and it shows that folks who don’t accept and adjust to new things end up paying a price.

The idea is that the writer – Mathias Thurman, a corporate security manager -- deployed a loaner in-line firewall (from Palo Alto Networks). The IT department balked at deploying the in-line features, meaning that they ended up with new equipment that they used as if it was old. Thurman didn’t merely order them to (he could have) but led them to understand how much they were missing. He does a nice job describing how he made the IT staff see the difference between the new and old UTM technology.

Essentially, this new approach to Unified Threat Management Device technology is to not stop at reporting suspicious activity. They react by proactively denying access when suspicious activity occurs. The passive versus active distinction is an important one. What is even more important, perhaps, is to remember that IT people are human and may need to be pushed to try new things. 

That’s not the only way Unified Threat Managment technology is changing. It is, for instance, a key early use of network functions virtualization (NFV), in which generic servers host Unified Threat Management Device software. This provides network managers with a tremendous amount of flexibility – but will be a challenge to vendors.

meraki security cameraThe Dell’Oro study says that Cisco controls 40 percent of the UTM segment. The company offers Cisco Meraki cloud-based Unified Threat Management appliances, which feature layer 7-aware stateful inspection capabilities; per-application UTM and bandwidth settings; content search and search filtering; Web caching; intelligent WAN management, SNORT-based intrusion detection and prevention and 4G wireless failover.

Meraki firewalls are managed through the Meraki dashboard (cloud based) and connect all Meraki hardware. This forms a self-policing, self-healing network fabric. Cloud licenses for various periods – 1, 2, 3, 5 or 10 years – can be purchased.

For more information on Meraki Firewalls, contact us today!

 

Topics: Firewalls, Meraki

Explore Our Full Cisco Line Up
VIEW MORE ABOUT CISCO
cisco devices-2