Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

3/28/2016
01:23 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

Like It Or Not, Firewalls Still Front And Center

Firewalls are still central to most network defense strategies, new State of the Firewall report says.

In spite of lots of advanced technology and moves to add many more layers of security to most enterprise defenses, firewalls aren't going anywhere soon as the heart of the cybersecurity toolset, according to a new report out today. Based on a survey of over 600 IT security practitioners, the State of the Firewall Report shows that the firewall is as entrenched as ever in modern network defense strategies.

"We're seeing small shifts in IT professionals' perceptions of the firewall as new technologies enter the market," says Jody Brazil, co-founder and chief product strategy officer at FireMon. "Adoption of SDN and network virtualization in general won't decrease the need for firewalls, but it may open the door to advancements or a new category of network protection. It will be more of a continuous evolution rather than a complete upheaval as so many are quick to claim."

According to survey respondents, 91% of security practitioners say that firewalls are as critical as always or more critical than ever to their security architecture, and the same ratio believe this will continue to be the case for the next half decade. These conclusions jibe with other industry reports that show how central firewalls still remain to network defense and management. For example, the InformationWeek 2015 Strategic Security Survey saw 61% of security practitioners reporting firewalls among their top three products on their security tool belt, the number one tool by some 25 percentage points.

Firewall technology and firewall strategies seem to be adjusting to the cloud and hybrid architectures today, as the number of organizations who find value in traditional and next generation firewalls (NGFW) for cloud services they manage increased by 10% in the past year, with over 67.7% of respondents finding them somewhat to highly valuable in cloud management.

That's not to say that changes in networking architecture won't impact firewall strategies; in fact, 90% of those surveyed report that software-defined networking (SDN) has impacted or will impact networking to a certain degree. And more than three times the number of respondents this year say they believe that native controls found in SDN solutions and new technologies will eventually pose a threat to the firewall's hegemony.

But with SDN adoption still in its infancy, that's a ways off. What's more, advancements in NGFW may offer a forward-looking roadmap that jibes with most organizations' security strategies, with or without SDN. Approximately, 66.5% of those surveyed say that NGFW plays a role in their SDN/virtualized environments.

As things stand, 50% of current firewall infrastructure in close to half of organizations is comprised of NGFWs, as compared to 34% in 2014. And only 6.7% of organizations today have no NGFW. The top benefits organizatons hope to gain from NGFW are IPS functionality, threat data integration and applicaton awareness.

"The threat to the firewall as the center of the security infrastructure is not immediate. It continues to play a critical role in the majority of today’s enterprises," the report stated. "However, the role of the firewall will have to evolve more as NGFWs become the norm and as emerging infrastructure paradigms such as SDN, cloud and micro-segmentation take hold."

Related Content:

 

Interop 2016 Las VegasFind out more about security threats at Interop 2016, May 2-6, at the Mandalay Bay Convention Center, Las Vegas. Click here for pricing information and to register.

Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.  View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Pen Testers Who Got Arrested Doing Their Jobs Tell All
Kelly Jackson Higgins, Executive Editor at Dark Reading,  8/5/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-17476
PUBLISHED: 2020-08-10
Mibew Messenger before 3.2.7 allows XSS via a crafted user name.
CVE-2020-9525
PUBLISHED: 2020-08-10
CS2 Network P2P through 3.x, as used in millions of Internet of Things devices, suffers from an authentication flaw that allows remote attackers to perform a man-in-the-middle attack, as demonstrated by eavesdropping on user video/audio streams, capturing credentials, and compromising devices.
CVE-2020-9526
PUBLISHED: 2020-08-10
CS2 Network P2P through 3.x, as used in millions of Internet of Things devices, suffers from an information exposure flaw that exposes user session data to supernodes in the network, as demonstrated by passively eavesdropping on user video/audio streams, capturing credentials, and compromising devic...
CVE-2020-9527
PUBLISHED: 2020-08-10
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20, after 2018-08-09 through 2020), as used by many different vendors in millions of Internet of Things devices, suffers from buffer overflow vulnerability that allows unauthenticated remote attackers to execute arbitrary code via ...
CVE-2020-9528
PUBLISHED: 2020-08-10
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from cryptographic issues that allow remote attackers to access user session data, as demonstrated by eavesdropping on user video/audio strea...