aleksandar nakovski – inventory.adob
Practically 20 years after they had been first developed, next-generation firewalls immediately play a key function in most organizations’ cybersecurity infrastructures. Amongst different advantages, NGFWs provide a mix of conventional firewall capabilities mixed with options designed to detect and cease refined cyberattacks.
This text outlines key options and capabilities that CISOs and safety decision-makers ought to take into account when evaluating trendy NGFWs and examines 5 prime firewall choices.
Key NGFW options
NGFWs are {hardware}, software program or cloud-based units that reach conventional firewall capabilities past packet inspection — filtering visitors by IP tackle, port and protocol — and stateful inspection — monitoring the state of connections. Along with these baseline controls, NGFWs provide deep packet inspection (DPI), which examines the payload of community visitors somewhat than simply packet headers. DPI allows the firewall to find, determine, classify and reroute or block malicious content material in in any other case authentic visitors.
Trendy NGFWs additionally provide software consciousness and management, built-in intrusion prevention programs, SSL/TLS inspection, consumer identification consciousness, logging and reporting, API-driven automation and automatic coverage suggestions.
Many NGFWs additionally use risk intelligence feeds to boost DNS and URL filtering and enhance the detection of malicious visitors. Superior NGFWs can detect coverage violations and mechanically block, quarantine or sanitize suspicious visitors earlier than alerting safety groups and integrating with different safety applied sciences for additional investigation .
NGFWs usually function a centralized visibility level for community exercise and assist organizations obtain and preserve a zero-trust structure.
Main NGFW merchandise
Let’s take a look at among the most generally used NGFWs that provide these options. Many different NGFW applied sciences can be found, every with its personal professionals and cons. The instruments profiled on this article had been chosen based mostly on market analysis. Every has a large buyer base, is beneath lively growth, and has quite a few publicly out there consumer evaluations from verified purchasers of NGFWs. This record is organized alphabetically.
Examine Level Quantum
Key options
- Makes intensive use of AI applied sciences as a part of its risk intelligence.
- Integrates with endpoint and cell detection and response applied sciences through the broader Examine Level platform.
- Gives extra security measures, resembling antispam, by means of its next-generation risk safety SandBlast bundle.
Professionals
- Excels at centralized administration, offering an intuitive GUI and dashboard that saves directors time.
- Cited for its reliability and stability.
Cons
- Licensing and subscriptions are reportedly extra advanced and costly than competing merchandise.
- In line with some consumer experiences, it fails to detect assaults that different distributors efficiently uncover and generates repeated false positives, particularly for e mail.
Gross sales and licensing
- Gives dozens of {hardware} fashions for on-premises deployments in addition to SaaS.
Cisco Safe Firewall
Key options
Professionals
- The latest interface is simple to deploy and use.
- Integrates easily with different Cisco cybersecurity merchandise.
Cons
- Some customers report documentation is both lacking or outdated.
- Upgrades and updates can take time to execute; questions on rollback capabilities.
Gross sales and licensing
- Gives a number of collection of hardware-based fashions, together with a rugged mannequin for operational know-how and IoT environments, plus service fashions for private and non-private clouds.
- Free trial is on the market.
FortiGate NGFW
Key options
- Makes use of AI as a part of risk intelligence to enhance the effectivity of safety and detection.
- Helps quantum-safe mechanisms for VPN cryptography; helps quantum key distribution alongside classical algorithms.
Professionals
- Integrates with different Fortinet applied sciences to supply a unified community safety basis.
- Efficient, dependable efficiency even beneath excessive workloads and with giant implementations.
Cons
- Steep studying curve, particularly for extra advanced configurations and people that may solely be completed by means of the CLI, partly as a result of some documentation and on-line sources are outdated.
- Challenges with updating firmware unexpectedly altering performance or introducing errors.
Gross sales and licensing
- Gives greater than 30 fashions of home equipment for all kinds of environments and desires, in addition to three as-a-service fashions.
Palo Alto Networks PA-Collection
Key options
- Built-in administration of Palo Alto merchandise by means of a single interface, Strata Cloud Supervisor.
- Simple customization of safety insurance policies tailor-made for various components of the group.
Professionals
- A simple-to-use interface with large flexibility; for instance, pushing out coverage updates throughout all the group’s firewalls without delay.
- Helps post-quantum cryptography choices.
Cons
- Steep studying curve that requires extra coaching and energy for admins to have the ability to totally use the product’s options.
- Product help, particularly in sure areas of the world.
Gross sales and licensing
- Gives a number of collection of fashions of PA-series {hardware} home equipment for varied environments and efficiency wants, together with a branch-office mannequin with 5G networking in-built. Cloud-native, digital and SaaS variations additionally out there.
Sophos Firewall
Key options
- A number of methods to research visitors, together with decrypting TLS 1.3-protected visitors, utilizing machine studying to determine zero-day assaults and utilizing cloud sandboxing to soundly execute suspicious payloads.
- Integrates with a number of Sophos endpoint and cell safety applied sciences to enhance response capabilities; additionally integrates with different Sophos services to help zero belief.
Professionals
- Simple-to-use interface for administration, monitoring, reporting and alerting.
- Stable integration with different Sophos applied sciences for administration, monitoring and detection functions.
Cons
- Producing experiences will be slower than desired, particularly in bigger implementations.
- Studying curve for implementing among the most superior options steeper than anticipated.
Gross sales and licensing
- Out there for deployment in cloud and digital environments, as {hardware}, and as software program to be deployed on the group’s personal {hardware}; a number of fashions of every choice can be found based mostly on the deployment measurement.
- Quite a few choices for licensing particular options or bundles of options, along with help subscriptions, safety licensing and subscriptions, and integration with different Sophos functions.
Karen Kent is the co-founder of Trusted Cyber Annex. She gives cybersecurity analysis and publication companies to organizations and was previously a senior pc scientist for NIST.
Dig Deeper on Community safety







