(+254) 0709 108000


 Citadel Building, 6th Floor Muthithi Rd, Westlands

One key element of this process is threat modeling. Conducting a threat model identifies potential weaknesses which can be evaluated prior to conducting a network penetration test.

What is a firewall?

A firewall is a device or service that acts as a gate keeper, deciding what enters and exits the network. It analyzes the traffic it sees passing through it by checking the packet headers and data. Based on its configuration, the firewall then decides accordingly whether to deny or allow traffic to pass through.

Implementing a firewall can take place almost anywhere on the network (or on the critical systems themselves). In addition to Web application firewalls (WAFs), there are both software and hardware-based firewalls.

How secure is a firewall?

A firewall isn’t airtight. It’s only as reliable as the configuration running on it and its own security posture. The best way to ensure that a firewall is reliable is to close off all communication and allow only the necessary traffic and services through. It should log all traffic and decisions to an external logging service, such as an intrusion detection system (IDS), which monitors for suspicious activity. It’s important to keep firewalls up-to-date with vendor updates and patches. This ensures that it doesn’t become the reason for an intrusion to the network.

What’s the next generation of network security?

There’s a new generation on the horizon and it is approaching fast. Emerging technologies in network security involve artificial intelligence (AI) running and integrating with the security space both physically and virtually. Properly tuning AI allows it to identify patterns much quicker than humans. For example, imagine a user who leaves for an afternoon coffee break. This user accidentally leaves their computer unlocked. Now imagine an AI solution that is able to tap into the organization’s Active Directory and the user’s local system. It then assesses that the user’s system is idle and that the same user has badged out of their office building. The AI system automatically locks the user’s desktop and notifies them that it has taken this action.

It identifies when the user’s account is accessed remotely (presumably for malicious purposes) and taps into the firewall to block access from that IP address. Thus, it disables the user’s account until they have badged back into the office, or until another condition is met to re-enable the account. AI can also use facial recognition from security cameras to recognize when users are in the building.

This technology is now possible and could very well be where the network and software security industries are leading.

Here at Xtranet Communications, we do provide Network Security keeping into consideration the business that you have.

Learn more about the Xtranet Communications Limited here http://xtranet.co.ke/

Contact Information

Citadel Building, 6th Flr.,Muthithi Rd, Westlands
P.O.Box 27346-00100
Nairobi, Kenya

Tel. Office: (+254) 0709 108000
(+254) 020 2490999
Email: info@xtranet.co.ke

Office Hours
Monday – Friday [8a.m. – 5p.m.]


Subscribe To Us!