Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

4/22/2016
09:30 AM
Steve Zurier
Steve Zurier
Slideshows
Connect Directly
Twitter
RSS
E-Mail
100%
0%

5 Features to Look For In A Next-Generation Firewall

When it comes to NGFWs, it's the integration that counts.
Previous
1 of 6
Next

Sure, the term next-generation firewall (NGFW) has been around since 2007 and the vendors have been hyping these products for a close to a decade.

So what’s new this year?

Adam Hils, research director, network security, at Gartner, says what’s different about today’s NGFWs is the integration of features such as an IPS or URL filtering within the firewall itself.

“Many SMBs go with UTMs and they have all the features companies need, but there’s really not much integration,” he says. “For the enterprise, companies should think about a next-generation firewall and evaluate how well they integrate multiple features right within the firewall.”

Gartner estimates that the global firewall market will grow from $8.3 billion in 2015 to $9.7 billion in 2017. Hils says these products need to support complex environments, including branch offices, demilitarized zones and virtual environments within the data center. Many of these products also offer centralized management and reporting consoles and claim to do analytics, but companies should look for integration with products like Splunk if they are really serious about doing analytics.

Vendors Gartner gives high marks to include Check Point Software Technologies and Palo Alto Networks, which are assigned leader status, as well as Cisco Systems and Fortinet. Other more niche players include Juniper Networks, Dell SonicWall, Intel Security, Huawei, WatchGuard and Barracuda Networks.

While there are many vendors to choose from, the following slideshow outlines the five main features IT that security managers should consider before selecting a product.

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Previous
1 of 6
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Page 1 / 2   >   >>
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/7/2016 | 8:06:49 AM
Re: gotta love stateful walls.
@hewent: Latency, man.  Gotta look at those benchmark tests.
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/7/2016 | 8:03:44 AM
Re: Firewalls and cost
@Dr.T: It's worth pointing out that if you consider total cost of ownership (TCO) as opposed to initial purchase price, the most secure or most cost-effective NGFW is not necessarily going to be the most expensive.

NSS Labs just did an interesting study on this; I reported about it for Dark Reading's sister site, Network Computing, here: networkcomputing.com/network-security/next-generation-firewalls-put-test/379303122

(That said, however, the Palo Alto NGFW tested in this reportedly has a huge initial purchase price and TCO, but performed extremely well in almost all security and performance tests.  It didn't make the "Recommended" cut for NSS Labs strictly because of cost issues.)
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
5/5/2016 | 7:27:36 AM
Re: gotta love stateful walls.
@hewent: You're not the only one with such concerns.  Indeed, the US cloud industry has lost dozens of billions of dollars since the Snowden revelations because of people being concerned about federal spooks spying on their cloud-stored data (or, for that matter, hackers using the same backdoors the feds were).
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/27/2016 | 12:58:53 PM
Firewalls and cost
 

Another point I would like to make is that the more complex the firewalls get the more expensive they will be for sure.  The problem is that does not solve our security issues, we need a layered approach when it comes to implementing security measures in our infrastructures to avoid vulnerabilities being exploited. 
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/27/2016 | 12:53:09 PM
Re: gotta love stateful walls.
"... Every ips, ids, deep packet inspection feature costs you crazy throughput"

Not only that but also the false positives of IPS. Ceratin packets would be dropped and that would increase traffic in the network so waste of effort.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/27/2016 | 12:49:37 PM
Re: gotta love stateful walls.
"...you can do is have your logs done in house ..."

Good point. If this is your perimeter firewall everything coming to your network in passing over it so it has real sensitive information where your log is actually your data. I could not give it to a third party.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
4/27/2016 | 12:45:43 PM
Re: Performance, et al.
 "... I think it's also important to look at how NGFWs perform ..."

I agree. The performance of doing its job with a high speed so it is not a bottleneck in the network but also with a high quality so it does not make false positive decisions.
Dr.T
100%
0%
Dr.T,
User Rank: Ninja
4/27/2016 | 12:42:58 PM
Firewall vs. Security
I enjoyed reading the article. Firewall and security are not the same think anymore. It is good that IPS is part of modern firewalls but  that is not what is helping in reality today. There is no intrusion but there is an attack.  We just heard a ransomware  attack today where they had bot IDS and IPS enabled in their network.

 
hewenthatway
50%
50%
hewenthatway,
User Rank: Strategist
4/26/2016 | 4:45:45 AM
Re: gotta love stateful walls.
Reply to Joe...

The throroughput on some of these puts you off when u first realize it.


Every ips, ids, deep packet inspection feature costs you crazy thoroughput/

On a 350mb/s connection i only get 175mb/s
hewenthatway
50%
50%
hewenthatway,
User Rank: Strategist
4/26/2016 | 4:22:22 AM
gotta love stateful walls.
i love my big ngfw's...have did all the training on dell and fortinet and cisco with the certs and cant move on without becoming a "partner" of dell or pay sans crazy $ to proceed :(

sonicwalls integration with rsyslogs and some of the new logging and analytics (splunk) and machine data aggregation is cool too.  What worries me is the fact that you are in essence sending your most crucial logs and means of tracking down an attacker to another network (cloud) and having faith that the data wont be mined and activities tracked by a 3rd party.

It seems as if this would be a prime target with a large attack surface for a big brother type to harvest and there are a lot poping up nowadays.

Or perhaps all you can do is have your logs done in house or at best smtp smnp or ftps behind said firewall and block all the ports and protocols that you can and auth as much as u can ;) 

the ssl/tls dpi, vpn, ids, ips, application filtering, l2 bridging are bonus's imho

#EDIT  the log system i was thinking of was "smnp (v3)", "not as earlier smtp"
Page 1 / 2   >   >>
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/14/2020
Lock-Pickers Face an Uncertain Future Online
Seth Rosenblatt, Contributing Writer,  8/10/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 New Cybersecurity Vulnerabilities That Could Put Your Enterprise at Risk
In this Dark Reading Tech Digest, we look at the ways security researchers and ethical hackers find critical vulnerabilities and offer insights into how you can fix them before attackers can exploit them.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17475
PUBLISHED: 2020-08-14
Lack of authentication in the network relays used in MEGVII Koala 2.9.1-c3s allows attackers to grant physical access to anyone by sending packet data to UDP port 5000.
CVE-2020-0255
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2020-10751. Reason: This candidate is a duplicate of CVE-2020-10751. Notes: All CVE users should reference CVE-2020-10751 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-14353
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-18270. Reason: This candidate is a duplicate of CVE-2017-18270. Notes: All CVE users should reference CVE-2017-18270 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidenta...
CVE-2020-17464
PUBLISHED: 2020-08-14
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2020-17473
PUBLISHED: 2020-08-14
Lack of mutual authentication in ZKTeco FaceDepot 7B 1.0.213 and ZKBiosecurity Server 1.0.0_20190723 allows an attacker to obtain a long-lasting token by impersonating the server.