5 Features to Look For In A Next-Generation Firewall5 Features to Look For In A Next-Generation Firewall
When it comes to NGFWs, it’s the integration that counts.
April 22, 2016
Sure, the term next-generation firewall (NGFW) has been around since 2007 and the vendors have been hyping these products for a close to a decade.
So what’s new this year?
Adam Hils, research director, network security, at Gartner, says what’s different about today’s NGFWs is the integration of features such as an IPS or URL filtering within the firewall itself.
“Many SMBs go with UTMs and they have all the features companies need, but there’s really not much integration,” he says. “For the enterprise, companies should think about a next-generation firewall and evaluate how well they integrate multiple features right within the firewall.”
Gartner estimates that the global firewall market will grow from $8.3 billion in 2015 to $9.7 billion in 2017. Hils says these products need to support complex environments, including branch offices, demilitarized zones and virtual environments within the data center. Many of these products also offer centralized management and reporting consoles and claim to do analytics, but companies should look for integration with products like Splunk if they are really serious about doing analytics.
Vendors Gartner gives high marks to include Check Point Software Technologies and Palo Alto Networks, which are assigned leader status, as well as Cisco Systems and Fortinet. Other more niche players include Juniper Networks, Dell SonicWall, Intel Security, Huawei, WatchGuard and Barracuda Networks.
While there are many vendors to choose from, the following slideshow outlines the five main features IT that security managers should consider before selecting a product.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Deploy Zero Trust for Remote Workforce Security
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks