Reply to post: There are ways and there are ways

If we could just get a word in Edgewise... New kid says it can do data center firewalls better

Alistair
Windows

There are ways and there are ways

"ta center by allowing only trusted applications to communicate over approved network paths."

The impression given by statements like this is that this is a default deny, whitelist approach, but using (FTA, and comment) authentication, domain controller, and ipcs to determine if both source and destination are 'known valutes'.

Question: -> how much *additional* network traffic is added by the whitelist to authentication verification, and what are the timecycles like? What sort of authority level is required by the 'firewall' itself in order to run this toolset?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

SUBSCRIBE TO OUR WEEKLY TECH NEWSLETTER

Biting the hand that feeds IT © 1998–2021