Security professionals often attach a packet capture security appliance to a span port on hardware network equipment to capture network packets in a data center. On AWS customers do not have access to span ports and physical networking equipment. This led some security professionals to believe it is not possible to implement a packet capture solution on AWS. In fact, packet … [Read more...]
Using Firewall Policies to Auto-Block Rogue Hosts on External Networks
Automatically preventing all traffic from hosts that attempt to connect to blocked ports can help prevent further malicious actions from those IP addresses as explained in Auto-Blocking Suspicious Hosts Found in Traffic Logs. After posting that article, one WatchGuard customer sent me a note about using the auto-block feature to help prevent DDoS attacks. By reducing the … [Read more...]
Auto-Blocking Suspicious Hosts Found in Traffic Logs
Many attackers and hosts infected with malware try to infect other hosts by scanning networks for open ports exposed to the Internet. After finding an open port, a malicious third party will attack software running on that port using known vulnerabilities. These published software flaws can cause damage or allow unauthorized access to hosts and networks. Often vendors publish … [Read more...]
New eBook Explores Unlocking the Promise of UTM-Enabled Network Protection
Combatting enterprise-grade threats, without the resources to deploy enterprise-grade solutions, is a key security challenge for today’s midsize businesses. It often results in a piecemeal approach to network security and a complex, disjointed strategy that leaves significant gaps in protection. To help overcome these challenges, we’ve teamed up with Frost & Sullivan to … [Read more...]