Next-generation firewall products: Ready or not, here they come

Next-generation firewall products: Ready or not, here they come

Next-generation firewall products: Ready or not, here they come

Date: Sep 10, 2013

While many information security teams may be perfectly happy with the "old" firewall and its role in the network security infrastructure, next-generation firewall products are here, ready or not, and they offer a new world of advanced capabilities. As networks become more complex, these products can effectively keep a network manageable and secure. However, it is crucial to ensure that you are prepared for the expanded role a next-generation firewall (NGFW) plays.

In this video, network security expert David Strom discusses the distinguishing characteristics of next-gen firewall products, such as application granularity and awareness, IP reputation management, and integrated IPS. Additionally, Strom explores the various issues you may encounter with NGFW deployments, such as out-of-date network documentation and the misuse of existing firewalls in a network infrastructure. Finally, Strom discusses the pros and cons of unified threat management (UTM) tools, since they are frequently mentioned alongside NGFWs.

About the author:
David Strom is a freelance writer and professional speaker based in St. Louis. He is former editor in chief of TomsHardware.com, Network Computing magazine and DigitalLanding.com. Read more from Strom at David Strom's Web Informant.

More on Network Security: Tools, Products, Software

  • canderson

    Defense in Depth 2.0

    VIDEO - This video will offer an executive overview of not only the key business and technical issues that have necessitated a dramatic change in defense in depth design, but also how to develop a strategy that can be used to drive an organization’s layered defense tactics amid a threat landscape that has evolved rapidly in the last 1-2 years.
  • Six criteria for procuring security analytics software

    Feature - Security analytics software can be beneficial to enterprises. Expert Dan Sullivan explains how to select the right product to fit your organization's needs.
  • Comparing the top SSL VPN products

    Feature - Expert Karen Scarfone examines the top SSL VPN products available today to help enterprises determine which option is the best fit for them.
  • Four criteria for selecting the right SSL VPN products

    Feature - SSL VPNs can offer critical protection for enterprise network communications. Expert Karen Scarfone examines the most important criteria for evaluating SSL VPN products.
  • The three enterprise benefits of SSL VPN products

    Feature - Expert Karen Scarfone outlines the ways SSL VPN products can secure network connections and communications for organizations.
  • Introduction to SSL VPN products in the enterprise

    Feature - Virtual private networks secure the confidentiality and integrity of network communications. Expert Karen Scarfone explains how SSL VPN products work.

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: