Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

RSA: Trio Of Next-Gen Firewalls Try To Keep Up With Evolving Threats: Page 3 of 3

Firewalls have to adapt to the expanding threat landscape that networks face, says The 451 Group's Hanselman. Take SQL injections, for example. With a SQL injection, a query provides an attacker with access to a SQL database for seemingly legitimate reasons. The attacker is then able to gain access to other parts of the database and the network to gain wider control of it. The intruder could use that access to execute SQL commands to introduce malware, commandeer resources to launch an attack or to steal data from the target.

A NGFW would closely scan typical HTTP traffic, but be able to separate out SQL commands that may be suspicious. "A NGFW would scan your HTTP traffic for SQL commands, which have a particular format, and ... it would know that when it saw a set of SQL commands, then it would suddenly realize that, 'Hey, this isn't OK,'" he says.

Hanselman cites the Juniper Networks SRX and the Cisco Systems ASR as appliances that closely scrutinize traffic for such abnormalities.

RSA Conference 2012 is expected to draw about 20,000 attendees to San Francisco's Moscone Center Feb. 27 through March 2.

Learn more about Strategy: Securing Flat Networks by subscribing to Network Computing Pro Reports (free, registration required).