Essential Guide

Browse Sections


This content is part of the Essential Guide: Next-generation firewalls for modern network security architectures
Evaluate Weigh the pros and cons of technologies, products and projects you are considering.

Network security architecture with a next-generation firewall

Expert Dave Shackleford walks listeners through two main scenarios for fitting a next-gen firewall into their existing network security architecture.

As firewall products get more sophisticated, more enterprises are rethinking their network security architectures, wondering whether and how to adapt to an increasingly dangerous network world. In this podcast, Dave Shackleford explains the issues central to the do-we-or-don't-we debate and offers two broad approaches to putting a next-generation firewall (NGFW) into your network security architecture.

NGFW advantages are many. It's a network security device that not only lets you do Layer 3 and Layer 4 traffic control but also inspects application traffic, helps identify malicious applications, and might also have antimalware functionality and more. Shackleford describes two use cases: using NGFW as a replacement for your existing firewall architecture or adding it to your infrastructure to augment security. How does NGFW affect IPS? Where does it work best as security augmentation? Shackleford addresses these questions as he walks the listener through the main reasons why an IT team might choose one approach over the other, depending on the organizational goals that shape the enterprise security architecture and design. 

The bottom line is that NGFW is not a panacea but it is a valuable tool that likely should be part of your network security strategy. Learn how it fits best in your enterprise by listening to the podcast.


This was last published in June 2014

Dig Deeper on Network Security Best Practices and Products

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.