Next Gen Firewalls, New Ways Against Computer Viruses

Jakarta - To ward off the lurking threat of computer users , in addition to antiviral generally ' guard ' which also is the standby firewall . But with a growing evolution of the virus, Firewall technology just often tricked by the virus at this time . Thus create what is called Next Gen Firewall . Next Gen Firewalls basically have the same working principle with conventional firewall . However, when a conventional firewall is more focused on the threat of identification and pass through ports predetermined protocol , Next Gen Firewall is more complex because it also detects the application ID , user ID , and conten ID that has been registered . Described by U. Pudja Kartiman , Country Director of Palo Alto Networks , in many cases today , the virus often outsmart ports and protocols are monitored Firewall with a ride on the application has been registered . Practically , the Firewall was not able to identify the virus through it . This slit is fixed in Next Gen Firewall . The movement of the virus through the identification is made more narrow application ID , user ID , and the more complex the content ID . With so entities that pass through ports and protocols are allowed to be more specific . " Next Gen Firewall could say it just does not follow the conventional firewall rules only identify ports and protocols listed , but it's better because it is able to identify the application ID , user ID , and the content ID . Make it more specific in the past allows entities , "said Palo Alto Networks Indonesian officials at the Intercontinental Hotel , Jakarta . Palo Alto Networks itself is one of the thrusts of this solution . Holding Ingram Micro to distribute in Indonesia , a manufacturer based in California , USA is also named Wildfire features that can detect ' movement ' foreign entity . Interestingly , when finally ' movement ' is identified as a threat , this feature will automatically update its database of virus introduction . So when recognizing a similar threat , the execution will be done right . Another interesting feature is its global protected . Thanks to these features the use of BYOD ( Bring Your Own Device ) in corporate circles is believed to be more secure because ID such as email , application ID , and the other is installed on the device must first be registered through the feature .

No comments:

Post a Comment