How To Evaluate Next-Generation Firewalls

A host of new network threat-protection products will be introduced at RSA, but not all firewalls are built the same.

Dark Reading Staff, Dark Reading

February 29, 2012

1 Min Read
Dark Reading logo in a gray background | Dark Reading

Much of the attention at this week's RSA Conference 2012 will be on the next-generation firewall (NGFW) and how it is getting more sophisticated as the threats to computer networks get more sophisticated as well. A number of vendors will be making NGFW announcements during the conference in San Francisco, but not all solutions advertised as next-generation firewalls are created equal, says one analyst.

"As with any term, once the marketing department gets hold of it, things can spread pretty dramatically," states Eric Hanselman, research director for networks at The 451 Group. While solutions such as intrusion detection or intrusion prevention systems (IDS/IPS), virtual private networks (VPN) and web application firewalls are common features of a NGFW, other vendors tout features such as SSL acceleration or WAN acceleration as a component, too.

Hanselman says the core functionality of a NGFW should be protecting the network from outside or inside threats. Everything else may be nice to have but not a core function. He uses an automotive analogy.

"A next-generation car would include things like ABS and more sophisticated traction control, things that are related to the driving of the car, as opposed to things like air conditioning or a better sound system," he says.

[ See our complete RSA

Read more about:

2012

About the Author

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights