Round 1: The 2014 Next Generation Firewall Challenge
The recent Heartbleed exploit and Target breach have shown the importance of having the best cyber defenses available. Next Generation Firewalls (NGFW) have emerged as the key piece in the defense of our enterprises.
The Next Generation Firewall needs to be able to combat Advanced Evasion Techniques (AET) and understand the nature of attacks, so it will not be chasing hackers, but getting ahead of them. The NGFW needs to be supported by up-to-the-minute research with the ability to get the information into the field fast and effectively. High performance is a must, but it needs to be achieved without driving cost through the roof.
The question is: “Which security vendor has the right solution to keep the bad guys out of your enterprise?” I have brought together four leading NGFW vendors - Dell, HP, Juniper Networks and McAfee to shed light on how their solutions confront the difficult security environment you face. The Challenge document doesn't focus on why NGFWs are important. I think we all know they are. Instead, it is a guide to how they handle the most difficult issues facing security.
2014 Next Generation Firewall Challenge Series presented by Robin Layland
Round 2: Webcast Panel Discussions
Industry analyst Robin Layland joins Deena Thomchick from Juniper Networks and Steve Smith from McAfee to discuss how Next Generation Firewalls play a critical role in stopping Advanced Evasion Techniques. The discussion first covers the problems older firewalls have in stopping AETs and how NGFW plugs the gap. We then have a lively discussion on the role of NGFWs and sandboxes in finding AETs. The discussion ends with a review of what to look for when shopping for a NGFW.Download this white paper now
Jennifer Ellard from HP, Patrick Sweeney from Dell and Robin explore what role research by security vendors plays in stopping threats. Issues examined include the definition and importance of good research and how vendors shine and fall short. The discussion then moves on to selecting a security solution that is backed by world-class research.Download this white paper now
In the data center today, several major trends are happening in parallel, with each representing a fundamental change in terms of how IT is managed. For the security teams responsible for safeguarding corporate IT assets, these trends present a host of challenges, necessitating several new capabilities and approaches to ensure ongoing, effective security. This white paper examines these trends, and it reveals the key capabilities that today’s security teams require to effectively ensure that vital corporate assets remain secure, while at the same time optimizing access, cost, and administrative efficiency.Download this white paper now
Next-generation (NG) firewalls, with features such as deep packet inspection, intrusion detection, application identification, and granular control, are important weapons in the battle against hacking and malware. Mobile applications have taken the overall scheme of corporate IT, and NG firewalls enable organizations to incorporate full-stack inspection to support intrusion prevention. This white paper explores the reasons for implementing NG firewalls and lays out a path to success for overburdened IT organizations.Download this white paper now
The risk of network security systems being compromised by AETs continues to grow as more and more cybercriminals actively exploit this vulnerability. The answer is to combine stream-based inspection with data normalization on multiple protocol layers. This white paper will help you understand the essential design principles to detect and stop advanced evasion techniques and learn how to use multilayer traffic normalization and data stream-based inspection to prevent AET attacks.Download this white paper now
Next-generation firewalls (NGFWs) have emerged to revolutionize network security as we once knew it. Yet to safeguard an organization from today's ever-evolving threats, NGFWs must be able to deliver an even deeper level of network security. Not only must they ensure that every byte of every packet is inspected but also they must maintain the high performance and low latency that busy networks require. In addition, they must combine high-performance SSL decryption and inspection, an intrusion prevention system (IPS) that features sophisticated anti-evasion technology, granular control over and visibility into application and user activity across the network, and a network-based malware protection system that leverages the power of the cloud. Only when these technologies are working together can organizations truly block the sophisticated new threats that emerge on a daily basis.Download this white paper now