Internet Security

Skip to Main Content »

Have a Question? We Can Help!
Call Toll-Free 1-866-403-5305

Welcome to

You're currently on:

How Intrusion Detection Systems (IDS) Works on Firewall?

Tuesday, May 7, 2013 10:39:16 PM America/New_York

An Intrusion Detection System or IDS is a security solution which, when deployed in a network, monitors the network traffic for malicious and suspicious activities, and alerts the security administrators by triggering the alarm. There is a misconception that an Intrusion Detection System is a firewall. Although both IDS and firewall are network security appliances, they differ in their functionality and the approach they take to monitor the network traffic. Read More

Protect the Network with Certificate Control

Friday, December 16, 2011 7:08:01 AM America/New_York

We've all seen it. We're browsing around the Internet looking for that latest Windows driver or the next big application for the sales department and just as we think we have hit pay dirt we get the following screen...
Read More

Why Firewall Port Blocking No Longer Works

Tuesday, November 15, 2011 5:13:28 PM America/New_York

Since the mid 1990's Network Address Translation (NAT) was designed to alieviate IP address exhustion.  Along with this technology came the ability for network administrators to control what outbound ports users could access.  Example, for

Read More

Stay Secure with SSH Encryption

Thursday, June 2, 2011 5:08:35 PM America/New_York

SSH or Secure Shell, is an encryption wrapper for secure communication over a network. SSH is a software based approach to help solve problems of Internet security. By using techniques like SSH you can provide a more secure environment for your users and business network assets.

Read More

3 Lessons Learned from the Sony PlayStation Network Breach

Friday, May 6, 2011 9:51:59 AM America/New_York

There has been a huge rash of network attacks over the last few months.  Many involving high-profile websites such as Barracuda Networks, RSA, Sony, and many more.  These are but a small handful of publicized breaches with 1,000's more that have gone unnoticed or unannounced.  In many of these cases they involve human error in following a basic procedure when it comes to protecting your network.  Using Sony's PlayStation Network attack as an example we will examine 3 of these procedures you should know.

Read More

Why You Need Desktop and Gateway Antivirus Protection

Monday, May 2, 2011 2:33:51 PM America/New_York

This is a common question (and with good reason) we receive almost weekly. On first thought it is easy to think that having your firewall provide antivirus protection (a.k.a. gateway antivirus) your network should be protected from viruses. However, this is not the complete picture. Note the following chart: Read More

10 Must-Have Features in Your Next Firewall

Wednesday, April 27, 2011 3:21:46 PM America/New_York

Since the introduction of firewalls in 1988 their function and features have contnuously evolved over time. These new features are driven by new Internet threats that are created on a daily basis as hackers find new ways to exploit this "old technology. Here we are in 2011 and the program still hasn't changed. New firewall technology quickly becomes old technology and the vicious cycle never ends. As of today's date, minute, and second the following 10 features must be avaible on the next firewall you purchase: Read More Releases SonicBACKUP App

Monday, April 18, 2011 11:21:10 AM America/New_York

Noblesville, Indiana April 18, 2011 --, a leading provider if SonicWALL Internet security and managed services, today announced the availability of SonicBACKUP for SonicWALL

Read More

New SonicWALL Bandwidth Application Monitor

Tuesday, February 15, 2011 12:33:42 PM America/New_York

 In the latest SonicOS Enhanced version 5.8.x.x SonicWALL has implemented a new feature called the Real-Time Monitor.  The monitor allows you to track:

Bandwidth used by applications (e.g. YouTube, SalesForce,

Read More

How to Add Your SonicWALL Firewall to Viewpoint

Tuesday, November 30, 2010 4:23:18 PM America/New_York

This video is the 2nd and final video for setting up and configuring SonicWALL Viewpoint.

In this video you will learn how to configure your SonicWALL firewall to

Read More

Subscribe to Our Blog

   Subscribe to RSS   Subscribe to Facebook   Follow on Twitter   Follow on YouTube

Join The Other SonicWALL Readers Just Like You.