/
Zero Trust Segmentation

The Firewall: A Brief History of Network Security

To really understand the security landscape we’re living in, we need to put it in the context of what’s been happening until now. A key part of network security — since, well, the beginning of the network — has been the firewall. So, we offer to you a brief history of the firewall.

A Brief History of the Firewall

And so here we are. In a world where the firewall is still seen as synonymous with data center security—but where there is no single place to put a choke point.

...And a Bonus

While researching key dates for this timeline, I asked Illumio’s security technologist if there were any interesting facts or tidbits in his brain about firewalls, and he told me that, yes, there were a few “thingies” he wanted to share with our readers. Here was my favorite “thingy” he told me:

“Firewalls do a good job at what they are designed to do. The problem is they get installed and promptly forgotten about.  Firewalls are like sports cars, they have to be tuned up and customized for the conditions they will be running in. Like cars, they are tested in controlled conditions and advertised using the best possible numbers. The reality is much different. Your network and your data flows are going to not only be different than other companies', but they'll change and morph over time. Firewalls need tune-ups and daily care and feeding. Remember, you’re putting your data out there and challenging the world to come and get it. Give the firewall a break, man! It’s not a miracle box — or a ShamWow. It does not solve all your security issues.”

Related topics

No items found.

Related articles

Are You Getting the Most Out of Your Zero Trust Strategy?
Zero Trust Segmentation

Are You Getting the Most Out of Your Zero Trust Strategy?

Digital transformation in the last few years has dramatically expanded the attack surface. To cope with the move to remote work and increasing migration to the cloud, many IT environments have shifted from on-premises to hybrid, hyper-connected networks.

Micro-Segmentation Is Helping Organizations Embrace Zero Trust Security
Zero Trust Segmentation

Micro-Segmentation Is Helping Organizations Embrace Zero Trust Security

Over the last two years, organizations have turned to Zero Trust security and microsegmentation to better navigate the new normal of surging cyberattacks, cloud computing and work-from-anywhere business models.

An Architect's Guide to Deploying Microsegmentation: Managing the Vendor Relationship and Operational Integration
Zero Trust Segmentation

An Architect's Guide to Deploying Microsegmentation: Managing the Vendor Relationship and Operational Integration

Transitioning from traditional network segmentation (such as firewalls) to micro-segmentation requires an orchestrated effort led by architects or project managers.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?