Boundless Pages
Home
Risk Awareness
Cyber Security Risk Management
Next-Generation Firewalls Explained
Next-generation firewalls (NGFWs) are advanced network security devices that offer more comprehensive protection than traditional firewalls. Unlike traditional firewalls, which primarily focus on filtering traffic based on IP addresses, ports, and protocols, NGFWs incorporate a range of additional features to address modern security challenges. These features include application awareness, integrated intrusion prevention, user identity awareness, and more advanced inspection of network traffic.
The primary function of a Next-Generation Firewall is to control traffic based on application-layer data rather than just network-layer information. This enables NGFWs to inspect the actual content of network traffic, allowing them to identify and block malicious applications, viruses, or other threats that traditional firewalls might miss. NGFWs integrate several security functions into a single device, including deep packet inspection (DPI), intrusion prevention systems (IPS), and VPN support.
One of the key innovations of NGFWs is the ability to provide application awareness and control. Traditional firewalls are often limited to allowing or blocking traffic based on simple rules related to IP addresses, ports, and protocols. NGFWs, however, can identify and filter traffic based on the specific applications being used, regardless of the ports or protocols they use. This means that an NGFW can identify and control applications like social media, file-sharing programs, or streaming services, regardless of whether they are using standard ports like HTTP or HTTPS.
Another important feature of NGFWs is intrusion prevention. While traditional firewalls typically only block or allow traffic based on predefined rules, NGFWs incorporate intrusion prevention systems (IPS) that analyse network traffic in real-time to detect and block potential attacks, such as malware, SQL injection, and denial-of-service (DoS) attacks. NGFWs can even look for patterns of suspicious activity, providing a more proactive approach to identifying threats.
Additionally, NGFWs provide user identity awareness, which allows the firewall to make security decisions based not only on network traffic but also on the identity of the users involved. This feature enables organisations to create security policies tailored to specific users or groups, rather than applying the same rules to all network traffic. By integrating with directory services like LDAP or Active Directory, NGFWs can identify users and enforce policies based on their roles or access privileges.
Next-generation firewalls also support SSL decryption, which allows the firewall to decrypt and inspect encrypted traffic. This is particularly important given the increasing use of encryption for web traffic, as traditional firewalls are often unable to inspect encrypted traffic effectively. By decrypting SSL/TLS traffic, NGFWs can identify threats hidden within encrypted data, such as malware or command-and-control communication.
Another benefit of NGFWs is their ability to integrate with other security technologies, such as endpoint protection, SIEM (Security Information and Event Management) systems, and threat intelligence feeds. This integration enhances the overall security posture of an organisation by enabling better communication between different security tools, allowing for a more coordinated and effective defence strategy.
Despite their advanced features, NGFWs are not without challenges. They require proper configuration and tuning to ensure that legitimate traffic is not blocked, and the devices can become resource-intensive when performing deep inspections, especially in high-traffic environments. Additionally, NGFWs can be complex to manage due to their wide range of capabilities and the need for constant updates to threat intelligence databases.
Introduction to Cybersecurity Risk
Drivers for Cybersecurity Management
Governance, Risk and Compliance
Benefits of Cyber Risk Management
Cybersecurity Strategy
EU Cyber Resilience Act
Digital Operational Resilience
DORA and IT Suppliers
ISO 27005 Risk Management
Technical and Business Impact
Risk Appetite
Security Risk Register
Cybersecurity Risk Assessment
Cybersecurity Vulnerability Risk Rating
Assessing Security Risks
Assessing Risk in Unsupported Systems
Cybersecurity Vulnerability Rating
Cybersecurity Threat Vectors
Cybersecurity Kill Chain
NCSC Cyber Assessment Framework
Plan-Do-Check-Act (PDCA) Cycle
Business Continuity Planning
Business Impact Analysis
Intrusion Detection System
Next-Generation Firewalls
More Next-Generation Firewalls
SIEM
Effective SIEM Management
Effective Incident Management
Roles and Responsibility Matrix
10 Steps of Cyber Security
10 Steps of Cyber Security P2
Vulnerability Management
Identity and Access Management
Cyber Security Risk-based Approach
Cyber Security Baseline Management
Cyber Resilience Framework
Supply Chain Risk Management
Supply Chain Risks
Incident Response
Incident Response Lessons Learned
Red Teams
Cybersecurity Training Videos
Cybersecurity Kill Chain
10 Steps to Cybersecurity
By Passing Microsoft 365 MFA