/
Segmentation

The Firewall: A Brief History of Network Security

To really understand the security landscape we’re living in, we need to put it in the context of what’s been happening until now. A key part of network security — since, well, the beginning of the network — has been the firewall. So, we offer to you a brief history of the firewall.

A Brief History of the Firewall

And so here we are. In a world where the firewall is still seen as synonymous with data center security—but where there is no single place to put a choke point.

...And a Bonus

While researching key dates for this timeline, I asked Illumio’s security technologist if there were any interesting facts or tidbits in his brain about firewalls, and he told me that, yes, there were a few “thingies” he wanted to share with our readers. Here was my favorite “thingy” he told me:

“Firewalls do a good job at what they are designed to do. The problem is they get installed and promptly forgotten about.  Firewalls are like sports cars, they have to be tuned up and customized for the conditions they will be running in. Like cars, they are tested in controlled conditions and advertised using the best possible numbers. The reality is much different. Your network and your data flows are going to not only be different than other companies', but they'll change and morph over time. Firewalls need tune-ups and daily care and feeding. Remember, you’re putting your data out there and challenging the world to come and get it. Give the firewall a break, man! It’s not a miracle box — or a ShamWow. It does not solve all your security issues.”

Related topics

No items found.

Related articles

KPMG Partner Indy Dhami Explains Where to Start With Cyber Resilience
Segmentation

KPMG Partner Indy Dhami Explains Where to Start With Cyber Resilience

Unpack the industry’s evolution over the past twenty years, why cyber resilience is more important than ever, and how to get business buy-in on your Zero Trust security initiatives.

Allowlist vs. Denylist
Segmentation

Allowlist vs. Denylist

Learn why allowlists are the perfect solution for securing east-west data flow.

3 Cybersecurity Rules Microsoft’s Sherrod DeGrippo Lives By — And Why You Should Too
Segmentation

3 Cybersecurity Rules Microsoft’s Sherrod DeGrippo Lives By — And Why You Should Too

Get insight from Sherrod DeGrippo, Director of Threat Intelligence Strategy at Microsoft, on the three cybersecurity commandments that she believes should be guiding every cyber leader’s decisions and strategy.

No items found.

Assume Breach.
Minimize Impact.
Increase Resilience.

Ready to learn more about Zero Trust Segmentation?