

It's time for a shift in mindset regarding the level of protection an NGFW must provide, to improve visibility, detect multi-vector threats, close security gaps that attackers exploit, and combat other sophisticated threats. NGFWs must evolve to stay relevant in a world that is dealing with dynamic threats - threats that we couldn't have anticipated just a few years ago. In addition, disparate solutions add to capital and operating costs and administrative complexity.įrom my own discussions with security professionals I know that they are frustrated with disparate point solutions and the cost, complexity and administrative headaches they create - not to mention the gaps in security. These point solutions lack the visibility and control required to implement effective security policy to accelerate detection of all threats and response. They leave gaps in protection that today's sophisticated attackers exploit.

Most organizations today secure their networks using disparate technologies that don't - and can't - work together. However, while NGFWs continue to be a vital part of an organization’s protection, they were designed for a time before advanced targeted threats started attacking our enterprises - threats which often go undetected until it's too late. Combining traditional packet filtering with some application control and IPS layered on top, today's 'legacy' NGFWs do pretty much what they say on the tin. When Gartner coined the phrase "next generation firewall", in 2003, it captured a then-nascent approach to traffic classification and control.
