Next-generation firewall products: Ready or not, here they come

Next-generation firewall products: Ready or not, here they come

Next-generation firewall products: Ready or not, here they come

Date: Sep 10, 2013

While many information security teams may be perfectly happy with the "old" firewall and its role in the network security infrastructure, next-generation firewall products are here, ready or not, and they offer a new world of advanced capabilities. As networks become more complex, these products can effectively keep a network manageable and secure. However, it is crucial to ensure that you are prepared for the expanded role a next-generation firewall (NGFW) plays.

In this video, network security expert David Strom discusses the distinguishing characteristics of next-gen firewall products, such as application granularity and awareness, IP reputation management, and integrated IPS. Additionally, Strom explores the various issues you may encounter with NGFW deployments, such as out-of-date network documentation and the misuse of existing firewalls in a network infrastructure. Finally, Strom discusses the pros and cons of unified threat management (UTM) tools, since they are frequently mentioned alongside NGFWs.

About the author:
David Strom is a freelance writer and professional speaker based in St. Louis. He is former editor in chief of, Network Computing magazine and Read more from Strom at David Strom's Web Informant.

More on Network Security: Tools, Products, Software

  • canderson

    Defense in Depth 2.0

    VIDEO - This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.
  • How can proper BYOD and IoT device onboarding improve security?

    Answer - The influx of BYOD and Internet of Things (IoT) devices into the workplace is calling for proper device onboarding processes. Expert Kevin Beaver offers helpful hints.
  • security information and event management (SIEM)

    Definition - Security information and event management (SIEM) is an approach to security management that seeks to provide a holistic view of organization’s information technology (IT) security. 
  • We honor the winners of Information Security Readers' Choice 2014

    Opinion - More than 1,700 voters weighed in and helped us award this year's top security technologies in 22 categories.
  • McAfee security products to gain integrated threat intelligence feeds

    News - Customers and partners like the new effort by the Intel-owned security vendor to integrate threat intelligence feeds with all of its existing products, but analysts are leery of lacking threat intelligence standards.

    ( Oct 29, 2014 )

  • Yahoo CISO: Enterprise security companies letting us down

    News - At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.

    ( Aug 08, 2014 )

There are Comments. Add yours.

TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: