Network Application Firewalls vs. Contemporary Threats

Video thumbnail (Frame 0) Video thumbnail (Frame 3000) Video thumbnail (Frame 6532) Video thumbnail (Frame 8706) Video thumbnail (Frame 9965) Video thumbnail (Frame 11819) Video thumbnail (Frame 13819) Video thumbnail (Frame 15145) Video thumbnail (Frame 16597) Video thumbnail (Frame 21632) Video thumbnail (Frame 23824) Video thumbnail (Frame 24997) Video thumbnail (Frame 28546) Video thumbnail (Frame 30896) Video thumbnail (Frame 32241) Video thumbnail (Frame 33846) Video thumbnail (Frame 36293) Video thumbnail (Frame 37715) Video thumbnail (Frame 39014) Video thumbnail (Frame 39823) Video thumbnail (Frame 41203) Video thumbnail (Frame 42923) Video thumbnail (Frame 45771) Video thumbnail (Frame 47351) Video thumbnail (Frame 48961) Video thumbnail (Frame 50182) Video thumbnail (Frame 52750) Video thumbnail (Frame 54687) Video thumbnail (Frame 57870) Video thumbnail (Frame 59176) Video thumbnail (Frame 60938)
Video in TIB AV-Portal: Network Application Firewalls vs. Contemporary Threats

Formal Metadata

Network Application Firewalls vs. Contemporary Threats
Title of Series
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Release Date

Content Metadata

Subject Area
In the last few years, a so called whole new generation of firewalls have been released by various vendors, most notably Network Application Firewalling. While this technology has gained a lot of market attention, little is actually known by the general public about how it actually works, what limitations it has, and what you really need to do to ensure that you're not exposing yourself. This presentation will examine/demystify the technology, the implementation, demonstrate some of the technology and implementation specific vulnerabilities, exploits, what it can and can't do for you, and how to defend yourself against potential weaknesses. Brad Woodberg: I hail from just outside of Detroit MI, graduating from Michigan State University with a BS in Computer Engineering. Prior to joining Juniper Networks a few years ago, I was a security consulting engineer at a consulting firm in Ann Arbor Michigan for four and a half years, responsible for everything from penetration testing to intrusion investigation, managed services, implementations - whatever our sales guys could sell. At Juniper I'm heavily involved with the product development, and security testing, and all sorts of involvement with our security team. In addition to my work at Juniper, I have also co-authored three technical books, Junos Security, Configuring Netscreen/SSG firewalls, and Configuring Juniper SSL VPN.

Related Material

Video is accompanying material for the following resource
Mechanism design Computer network Group action Right angle Information security Vector potential Twitter
Firewall (computing) Time evolution MIDI Actuary Entire function
Order (biology) Algorithm Computer hardware Hybrid computer Pattern language Mach's principle
Term (mathematics) Electronic signature Sanitary sewer Mach's principle
Cache (computing) Table (information) Sample (statistics)
Execution unit Order (biology) Sierpinski triangle Pattern language Price index Session Initiation Protocol
Execution unit Menu (computing) System identification
Email Execution unit Quilt Unified threat management System identification
Execution unit Server (computing) Computer-generated imagery Time zone Client (computing) Hill differential equation Convex hull Process (computing) Term (mathematics) Very long instruction word
Execution unit Demon Electronic meeting system Maxima and minima Menu (computing) Communications protocol Area Emulation
Execution unit Cache (computing) Model checking Menu (computing)
Cache (computing)
Execution unit Cache (computing) Synchronization
Inclusion map Execution unit Duality (mathematics) Graphics tablet Cache (computing) CNN 1 (number) Repeating decimal
Anwendungsschicht Mobile app Dialect Execution unit Radius Port scanner Gamma function Special unitary group Game theory Conflict (process) Run-time system
Wave Electronic mailing list Communications protocol
Communications protocol Game theory
Standard deviation Email Tablet computer Suite (music) Zeno of Elea Graph (mathematics) Simultaneous localization and mapping Pattern language Computer worm Encryption Bayesian network Message passing
Subset Mathematics Pattern language Solid geometry Matching (graph theory) Momentum Implementation Special unitary group
Software bug Cache (computing) Addition International Date Line Maize Communications protocol