Are you ready to deploy a Next Generation Firewall?

Lemarchand

Is Palo Alto the only true NGFW? SonicWall? Juniper SRX? Do you think that Gartner's definition of a NGFW is correct? Does anyone know of a matrix that maps out which vendors products truly meet the guidelines and which ones are just bolt on "catch up" attempts to create a NGFW?

 

Is the technology still in its infancy or is it mature enough to be deployed in major enterprises?

Topic: Security
Answer this Question

Answers

2 total
davidstrom
Vote Up (30)

The definition of what is "next gen" varies widely, and can mean "any firewall that does something more intelligent than allow/block particular ports."  McAfee, Juniper, Checkpoint and others all have something that fits this -- for example, can you block Facebook games but still allow people to access their Facebook wall and message traffic without having to write (and test) a lot of custom rules? 

You can take a look at a short video that I did here:

McAfee Firewall Profiler v2 offers new analysis features

jimlynch
Vote Up (23)

Hi Lemarchand,

You might want to give this article from Network World a read:

Next-generation firewalls: In depth
http://www.networkworld.com/news/2011/101711-next-generation-firewalls-i...

It will give you a good overview of what the issues are and what to look for.

Ask a question

Join Now or Sign In to ask a question.
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
The number of government requests worldwide seeking Twitter users' data, or the removal of content, increased during the first half of 2014.
Despite greater security awareness, most C-suite executives continue to undervalue CISOs, survey shows.
Anonymity network hacked with sophisticated traffic correlation technique.
IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday.
A group of attackers with links to the Chinese hacking underground has been targeting companies from the entertainment and video game industries for years with the goal of stealing source code.
After years of cajoling their users into sharing every thought, emotion and selfie, online firms are seeing that providing more private online spaces might also be profitable.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness