Definition

Learning Guide: Firewalls

In this Issue:

 


What is a firewall?

A firewall is a set of related programs located at a network gateway server that protects the resources of a private network from potential intruders. Firewalls do not verify that information is coming from a secure source. Instead, they enforce a set of rules that determine what information is allowed to pass.

There are two basic types of firewalls: packet-filters and proxy servers. Many commercial firewall products are hybrids of these two types. Regardless of which type of firewall you choose, someone has to configure the firewall to make it work properly. The rules for access must be defined and entered into the firewall for enforcement.

Firewalls are not the end-all, be-all solution to information security. They are, however, a necessary component of an effective information security infrastructure. In this introductory resource, we've gathered expert information to help you learn about how firewalls work -- and more importantly, how to pick the right one for your needs.
 

Read our complete Firewall definition with related links

 


How to select the right firewall for your needs

Depending on the size of your company and how much money you're willing to spend on securing your information, there are different types of firewalls that come packaged with various features and functions.

Frank Prince, senior analyst at Forrester Research Inc. in Cambridge, Mass., explains more about how various types of firewalls work -- and why he thinks most companies should seek outside help when selecting and implementing a firewall.
 


Expert Firewall Advice

Expert Advice: Kevin Beaver, CISSP 

Our firewall expert, Kevin Beaver, has compiled a checklist of best practices to help you make sure that your firewall is configured correctly for optimal performance and effectiveness.
Read Kevin's advice

 

 

This was last updated in April 2008
Posted by: Margaret Rouse

Email Alerts

Register now to receive SearchStorage.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More News and Tutorials

  • Coming in the August 2011 issue of Storage magazine

    A sneak peek at Storage magazine's August 2011 issue. Learn more about the state of backup deduplication, storage virtualization and new trends in data storage.

  • Coming in the July 2011 issue of Storage magazine

    A sneak peek at Storage magazine's July 2011 issue. Learn more about backing up virtual servers, performance tips and how to turn your data center storage into a storage cloud.

  • Storage magazine May 2011 PDF

    Download Storage magazine's all-digital issue at no cost. This month: The benefits, functions, future outlook and buying considerations for automated tiered storage technologies.

Do you have something to add to this definition? Let us know.

Send your comments to techterms@whatis.com

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: