Some Security Devices Just Aren't that Secure

By Steve Anderson December 11, 2012

Network security is high on a lot of people's lists these days. Keeping computers safe from attacks, keeping networks safe from attacks, and keeping the information contained therein from slipping out and being misused is a major priority. But according to a new report released today from Broadband-Testing, not every security device may be as powerful as their competitors on store shelves.

Broadband-Testing's report covered the results of performance testing for a set of four network firewall solutions on the market from Cisco Systems, WatchGuard, NetPilot, SonicWall and others. Broadband-Testing used the Spirent security suite to test out the devices, and established benchmarks for the devices, focusing on things like application traffic performance and network traffic performance both with and without attacks. The results produced some unexpected information, and will make anyone looking at new hardware for network security look twice.


Image via Shutterstock

What Broadband-Testing discovered was that, when any IT network firewall solution is stepped up to enable advanced functions like IDS / IPS functionality, there's a concomitant loss of performance in virtually every device tested. What this in particular means is that, whenever a device is selected for security, it needs to be tested, in that system, to ensure that it will actually do the job it sets out to do. But aside from that, basic firewall protection was sound, and most firewall products will actually do at least reasonably close to what they claim they will do. However, the other clear takeaway from Broadband-Testing's evaluation was that testing was especially important, given that the products involved in the testing had inherent differences that directly affected their ability to fight threats.

The founder and director of Broadband-Testing, Steve Broadhead, further elaborated on the key point about testing the claims of manufacturers in the field, saying, “Enterprises have much to lose by not taking the initiative to create and enforce a strict security regime. Instead they depend only on their security device vendors’ claims to assess the fortification of their network. The goal of this test was to look at different firewall solutions that sit at various price points and evaluate them on pure performance. Spirent’s solutions were instrumental in the testing, and were able to push the four products with realistic and scaling performance traffic and threat traffic. By testing the performance of the security devices and verifying against vendor claims, it was easy to identify areas of weakness in the network.”

Indeed, it's never a good idea to take any claims at face value—Ronald Reagan actually made the famous assessment, “Trust but verify”, which still serves as good advice today—but rather be prepared to independently assess their veracity before relying on them to provide the security that's all too necessary in the current environment.

Protecting systems from attack not only keeps those vital systems up and running, and providing their benefits to the larger body, but also prevents disastrous PR troubles like those Sony was faced with following the attack on the PlayStation Network. No system is fool-proof, of course, but being proactive and doing everything available to protect information will go a long way toward not only preventing the worst of the attacks on the network, but also preventing the worst of the attacks on the company itself in the event that something should go wrong. 




Edited by Brooke Neuman

Contributing TechZone360 Writer

SHARE THIS ARTICLE
Related Articles

What If You Could Speak to a Holocaust Survivor? Now You Can

By: Alicia Young    4/28/2017

The USC Shoah Foundation was founded by Steven Spielberg in 1994 to document first-hand accounts of the Holocaust for future generations. Since then, …

Read More

Russian Hacker Receives Record-Breaking Prison Sentence

By: Alicia Young    4/27/2017

Roman Valeryevich Seleznev was sentenced to 27 years in prison last week in the U.S. for stealing millions of credit card details from businesses.

Read More

Microsoft Brings New Talent to LinkedIn, Dynamics 365

By: Steve Anderson    4/27/2017

Microsoft gunning for a place in the human capital management sphere with new application, and the addition of Dynamics 365 to LinkedIn.

Read More

Four Tips for Untouchable Intellectual Property

By: Anna Johansson    4/26/2017

Intellectual property is considered an intangible asset and can include things like recipe ingredients, articles, logos, and proprietary systems and p…

Read More

Is it Time for Someone to Clean Slate a Gaming Console?

By: Rob Enderle    4/24/2017

I've been looking at a lot of the comments on game review articles and forums of late, and gamers appear to be disappointed that the games aren't gett…

Read More