/
Segmentation Zero Trust

Le pare-feu : bref historique de la sécurité des réseaux

To really understand the security landscape we’re living in, we need to put it in the context of what’s been happening until now. A key part of network security — since, well, the beginning of the network — has been the firewall. So, we offer to you a brief history of the firewall.

A Brief History of the Firewall

And so here we are. In a world where the firewall is still seen as synonymous with data center security—but where there is no single place to put a choke point.

...And a Bonus

While researching key dates for this timeline, I asked Illumio’s security technologist if there were any interesting facts or tidbits in his brain about firewalls, and he told me that, yes, there were a few “thingies” he wanted to share with our readers. Here was my favorite “thingy” he told me:

“Firewalls do a good job at what they are designed to do. The problem is they get installed and promptly forgotten about.  Firewalls are like sports cars, they have to be tuned up and customized for the conditions they will be running in. Like cars, they are tested in controlled conditions and advertised using the best possible numbers. The reality is much different. Your network and your data flows are going to not only be different than other companies', but they'll change and morph over time. Firewalls need tune-ups and daily care and feeding. Remember, you’re putting your data out there and challenging the world to come and get it. Give the firewall a break, man! It’s not a miracle box — or a ShamWow. It does not solve all your security issues.”

Sujets connexes

Aucun article n'a été trouvé.

Articles connexes

Comment ServiceNow segmente Azure et AWS avec Illumio
Segmentation Zero Trust

Comment ServiceNow segmente Azure et AWS avec Illumio

Pour en savoir plus sur la façon dont ServiceNow a mis en place la micro-segmentation, consultez cet article de blog.

3 règles de cybersécurité que Sherrod DeGrippo de Microsoft respecte — et pourquoi vous devriez le faire aussi
Segmentation Zero Trust

3 règles de cybersécurité que Sherrod DeGrippo de Microsoft respecte — et pourquoi vous devriez le faire aussi

Découvrez avec Sherrod DeGrippo, directrice de la stratégie de renseignement sur les menaces chez Microsoft, les trois commandements en matière de cybersécurité qui, selon elle, devraient guider les décisions et la stratégie de chaque responsable informatique.

Comment mettre en œuvre un modèle de sécurité Zero Trust dans un environnement largement ouvert
Segmentation Zero Trust

Comment mettre en œuvre un modèle de sécurité Zero Trust dans un environnement largement ouvert

A comprehensive overview of how to implement Zero Trust architecture.

Aucun article n'a été trouvé.

Assume Breach.
Minimisez l'impact.
Augmentez la résilience.

Vous souhaitez en savoir plus sur la segmentation Zero Trust ?