/
Segmentation

The Firewall: A Brief History of Network Security

To really understand the security landscape we’re living in, we need to put it in the context of what’s been happening until now. A key part of network security — since, well, the beginning of the network — has been the firewall. So, we offer to you a brief history of the firewall.

A Brief History of the Firewall

And so here we are. In a world where the firewall is still seen as synonymous with data center security—but where there is no single place to put a choke point.

...And a Bonus

While researching key dates for this timeline, I asked Illumio’s security technologist if there were any interesting facts or tidbits in his brain about firewalls, and he told me that, yes, there were a few “thingies” he wanted to share with our readers. Here was my favorite “thingy” he told me:

“Firewalls do a good job at what they are designed to do. The problem is they get installed and promptly forgotten about.  Firewalls are like sports cars, they have to be tuned up and customized for the conditions they will be running in. Like cars, they are tested in controlled conditions and advertised using the best possible numbers. The reality is much different. Your network and your data flows are going to not only be different than other companies', but they'll change and morph over time. Firewalls need tune-ups and daily care and feeding. Remember, you’re putting your data out there and challenging the world to come and get it. Give the firewall a break, man! It’s not a miracle box — or a ShamWow. It does not solve all your security issues.”

Related topics

No items found.

Related articles

What Organizations Want From Their Zero Trust Segmentation Providers
Segmentation

What Organizations Want From Their Zero Trust Segmentation Providers

Zero Trust is gaining traction all over the globe as a best practice approach for mitigating serious cyber risk.

3 Cybersecurity Rules Microsoft’s Sherrod DeGrippo Lives By — And Why You Should Too
Segmentation

3 Cybersecurity Rules Microsoft’s Sherrod DeGrippo Lives By — And Why You Should Too

Get insight from Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft, on the three cybersecurity commandments that she believes should be guiding every cyber leader’s decisions and strategy.

Join Illumio at RSA Conference 2023
Segmentation

Join Illumio at RSA Conference 2023

Meet Illumio Zero Trust Segmentation experts at this year’s RSA Conference in San Francisco on April 24-27.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?