<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Firewalls in Advanced Threat Prevention Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewalls/m-p/583892#M2188</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1562634633"&gt;@Marquizzlet&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A firewall is one aspect of security.&amp;nbsp; But I'd recommend not being dependent on one particular barrier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Personally I'm a fan of&amp;nbsp;layered security, also known as defense in depth.&amp;nbsp; This involves using multiple security measures to protect a system or network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An example would be a company using a combination of firewalls, intrusion detection systems, encryption, access control mechanisms, and regular security audits to safeguard their sensitive data and assets. Each layer adds an additional barrier, making it more difficult for attackers to penetrate the network and access critical information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Kim.&lt;/P&gt;</description>
    <pubDate>Tue, 16 Apr 2024 13:11:58 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2024-04-16T13:11:58Z</dc:date>
    <item>
      <title>Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewalls/m-p/583439#M2156</link>
      <description>&lt;P&gt;Hello, I am a student wondering, is a firewall the best for safeguarding sensitive information and network assets&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Apr 2024 22:55:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewalls/m-p/583439#M2156</guid>
      <dc:creator>Marquizzlet</dc:creator>
      <dc:date>2024-04-11T22:55:38Z</dc:date>
    </item>
    <item>
      <title>Re: Firewalls</title>
      <link>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewalls/m-p/583892#M2188</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1562634633"&gt;@Marquizzlet&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A firewall is one aspect of security.&amp;nbsp; But I'd recommend not being dependent on one particular barrier.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Personally I'm a fan of&amp;nbsp;layered security, also known as defense in depth.&amp;nbsp; This involves using multiple security measures to protect a system or network.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;An example would be a company using a combination of firewalls, intrusion detection systems, encryption, access control mechanisms, and regular security audits to safeguard their sensitive data and assets. Each layer adds an additional barrier, making it more difficult for attackers to penetrate the network and access critical information.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;Kim.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Apr 2024 13:11:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/advanced-threat-prevention/firewalls/m-p/583892#M2188</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2024-04-16T13:11:58Z</dc:date>
    </item>
  </channel>
</rss>

