O'Reilly logo

Securing the Borderless Network: Security for the Web 2.0 World by Tom Gillis

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. Network Security—Yesterday, Today, and Tomorrow

This chapter includes the following topics:

The Evolution of Firewalls

Proxy Versus Stateful Inspection

From Proxy to Stateful Inspection—and Back Again

The firewall is where our discussion about next-generation security for the Web 2.0 world—and beyond—begins. The modern firewall is the primary tool used by corporations to enforce security policies in the network. As we examine the security technologies that will enable us to secure the emerging “borderless network,” it is useful to have an understanding of how firewalls have evolved.

When the Internet became widely available in the 1990s, information technology (IT) organizations were focused on ensuring and enhancing connectivity ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required