Palo Alto: Top Picks
Palo Alto Networks
How to Fix Palo Alto Firewall “Error: Image File…
Keeping your Palo Alto Firewall up to date with the latest PAN-OS software updates is an important step to ensure your organization is protected agai…
Palo Alto Networks
Palo Alto Networks Firewall - Web & CLI Initial C…
This article is the second-part of our Palo Alto Networks Firewall technical articles. Our previous article was introduction to Palo Alto Networks Fi…
Palo Alto Networks
Introduction to Palo Alto Next-Generation Network…
During the past decade, we’ve seen the global IT security market flooded with new network security and firewall security appliances. New vendors emer…
Palo Alto Networks
The Benefits of Palo Alto Networks Firewall Singl…
What makes Palo Alto Networks Next-Generation Firewall (NGFW) so different from its competitors is its Platform, Process and Architecture. Palo Alto…
Featured Subcategories:
SD-WAN & SASE Articles:
SASE & SD-WAN Networks
Understanding Secure Access Service Edge (SASE) a…
Software Defined Wide Area Networking (SD-WAN) is changing the way that businesses connect to the cloud. With SD-WAN, organizations can move away fro…
SASE & SD-WAN Networks
The Most Common Worst Networking Practices and Ho…
In the rush to keep pace with the many challenges facing today’s organizations, all too often networking teams end up adopting practices and processe…
SASE & SD-WAN Networks
Check Point Software and Cato Networks Co-Founder…
By: Shlomo Kramer, Check Point Software & Cato Networks Co-Founder
As one of the founders of Check Point Software and more recently Cato Network…
SASE & SD-WAN Networks
SASE and VPNs: Reconsidering your Mobile Remote A…
The Virtual Private Network (VPN) has become the go to security solution for keeping communications between networks and endpoints secure. After all…
F5 Networks:
Network Protocol & Firewall Analyzers:
Network Protocol Analyzers
How to Detect P2P (peer-to-peer) File Sharing, To…
Peer-to-Peer file sharing traffic has become a very large problem for many organizations as users engage in illegal (most times) file sharing process…
ManageEngine Firewall Analyzer
Master Your Firewall: 6 Expert-Backed Steps to Bo…
In today’s evolving threat landscape, firewall audits are more than just a best practice—they're a critical line of defense. Regular audits ensure yo…
ManageEngine Firewall Analyzer
Dealing with Security Audit Challenges: Discoveri…
The utilization of log analyzers, such as Firewall Analyzer, in network infrastructure plays a pivotal role in enhancing cybersecurity and fortifying…
Network Protocol Analyzers
Advanced Network Protocol Analyzer Review: Colaso…
Firewall.cx has covered Colasoft Capsa several times in the past, but its constant improvements make it well worth revisiting. Since the last review…
Wi-Fi Key Generator
Follow Firewall.cx
Cisco Password Crack
Decrypt Cisco Type-7 Passwords on the fly!
Web Vulnerability Application Scanners & VPN Services
VPN Services & Guides
VPN For Torrenting, P2P and File Sharing. Test Anonymo…
The word torrenting is often viewed as synonymous with pirating. It’s seen as a shady and illegal practice, used to con hard working artists out of their…
VPN Services & Guides
VPN Hotspot - How to Stay Safe on Public & Guest WiFi…
Is Guest WiFi Safe?
It’s hard to go to a pub, café, or hotel these days without running into public or guest WiFi. In many cases, an internet connection…
Web Application Vulnerability Scanners
Acunetix Enterprise: Find Website - Web Application Vu…
Security researchers disagree about the percentage of vulnerable websites, but most concur that it’s way too high. Despite their long history, attackers c…
Web Application Vulnerability Scanners
Scan and Generate Firewall Rules to Secure your Websit…
ModSecurity is a very popular open-source web application Firewall used to protect webservers and websites from vulnerability attacks, exploits, unauthori…







