Since the earliest days of the Internet, when hackers sat in their darkened basements dialing into networks with dial-up modems, both network threats and network defenses have been evolving. Initially, it was sufficient to simply use port-based blocking for non-public resources. But outbound access to the Internet was required, and hackers quickly learned how to take advantage of the non-stateless nature of firewalls to circumvent them.

Download the Whitepaper