BACKGROUND IMAGE: iSTOCK/GETTY IMAGES
As firewall products get more sophisticated, more enterprises are rethinking their network security architectures, wondering whether and how to adapt to an increasingly dangerous network world. In this podcast, Dave Shackleford explains the issues central to the do-we-or-don't-we debate and offers two broad approaches to putting a next-generation firewall (NGFW) into your network security architecture.
NGFW advantages are many. It's a network security device that not only lets you do Layer 3 and Layer 4 traffic control but also inspects application traffic, helps identify malicious applications, and might also have antimalware functionality and more. Shackleford describes two use cases: using NGFW as a replacement for your existing firewall architecture or adding it to your infrastructure to augment security. How does NGFW affect IPS? Where does it work best as security augmentation? Shackleford addresses these questions as he walks the listener through the main reasons why an IT team might choose one approach over the other, depending on the organizational goals that shape the enterprise security architecture and design.
The bottom line is that NGFW is not a panacea but it is a valuable tool that likely should be part of your network security strategy. Learn how it fits best in your enterprise by listening to the podcast.