Next-generation firewall products: Ready or not, here they come

Next-generation firewall products: Ready or not, here they come

Date: Sep 10, 2013

While many information security teams may be perfectly happy with the "old" firewall and its role in the network security infrastructure, next-generation firewall products are here, ready or not, and they offer a new world of advanced capabilities. As networks become more complex, these products can effectively keep a network manageable and secure. However, it is crucial to ensure that you are prepared for the expanded role a next-generation firewall (NGFW) plays.

In this video, network security expert David Strom discusses the distinguishing characteristics of next-gen firewall products, such as application granularity and awareness, IP reputation management, and integrated IPS. Additionally, Strom explores the various issues you may encounter with NGFW deployments, such as out-of-date network documentation and the misuse of existing firewalls in a network infrastructure. Finally, Strom discusses the pros and cons of unified threat management (UTM) tools, since they are frequently mentioned alongside NGFWs.

About the author:
David Strom is a freelance writer and professional speaker based in St. Louis. He is former editor in chief of TomsHardware.com, Network Computing magazine and DigitalLanding.com. Read more from Strom at David Strom's Web Informant.

More on Network Security: Tools, Products, Software

  • canderson

    Defense in Depth 2.0

    VIDEO - This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.
  • Yahoo CISO: Enterprise security companies letting us down

    News - At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.

    ( Aug 08, 2014 )

  • air gapping

    Definition - Air gapping is a security measure that involves removing a computer or network from any externally connected network physically and also ensuring there is also no wireless connection. The NSA TEMPEST project provides recommendations for air-gapping security measures. For a system with extremely sensitive data, a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping from the air-gapped equipment.
  • Set up firewalls for the next generation: What to consider

    Tip - Considering a next-generation firewall? The latest features will facilitate design and architecture changes in your data center environment.
  • Deploying network security devices: Tips to avoid failed deployments

    Tip - John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise.
  • Evaluating network security virtualization products

    Tip - Don't risk making mistakes when you evaluate network security virtualization products. Our six key points will keep you on track.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: