{"id":1330,"date":"2012-04-13T05:00:55","date_gmt":"2012-04-13T12:00:55","guid":{"rendered":"http:\/\/www.yardi.com\/blog\/?p=1330"},"modified":"2020-12-24T00:18:07","modified_gmt":"2020-12-24T08:18:07","slug":"next-generation-firewalls","status":"publish","type":"post","link":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/","title":{"rendered":"Next Generation Firewalls"},"content":{"rendered":"<p>The primal contest between computer user security and the external threat environment will shift with next generation firewalls. Significantly upgraded over the previous state-of-the-art, next-gen firewalls offer improved visibility into the contemporary Web-based network landscape and a much-enhanced capacity to detect advanced threats. But is this truly a generational performance enhancement, or just the same ol&#8217; technology with an added dash of marketing magic? Let&#8217;s take a closer look.<\/p>\n<p><a href=\"http:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-1341\" title=\"protect data\" src=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-300x225.jpg\" alt=\"Binary code and lock shape on pixellated screen\" width=\"300\" height=\"225\" \/><\/a>Traditional firewall performance includes stateful port\/protocol inspection, network address translation (NAT), and virtual private network (VPN) integration. Typical services also include directory support (via Active Directory or similar) that\u00a0 authenticates and authorizes applications based on users and user groups. Also common is reputation-based filtering blocks applications that have earned a rep for naughty behavior. This helps discourage phishing attempts, virus infiltration, and additional malware sites and applications.<\/p>\n<p>Regardless of the vendor, next-gen firewalls include the following features:<\/p>\n<p><strong>Application ID &amp; filtering:<\/strong> This area is where next-gen firewalls really make a difference. Instead of the traditional all-or-nothing port opening approach, next-gen firewalls scan and filter traffic based upon the specific applications. Malicious applications that use non-standard ports to spoof countermeasures can be stopped dead in their tracks.<\/p>\n<p><strong>SSL and SSH inspection:<\/strong> Enhanced inspection technology means next-gen firewalls can put SSL and SSH encrypted traffic under the microscope. Decrypted traffic is inspected, filtered, and then re-encrypted. Advanced malicious apps that utilize encryption as a detection countermeasure are no longer a threat.<\/p>\n<p><strong>Intrusion prevention:<\/strong> Enhanced versatility and robust traffic inspection abilities provide all the functionality of a stand-alone intrusion prevention system. Most next-gen firewalls include full intrusion detection and prevention capability.<\/p>\n<p>In short, next-gen firewalls blend a full-service suite of performances \u2013 firewall, intrusion prevention, and additional security capabilities \u2013 into a single, efficient, high-performance appliance. The move to application-based filtering allows an unprecedented level of fine-tuning and threat protection.<\/p>\n<p><strong>Where do next-gen firewalls go from here?<\/strong><\/p>\n<p>Since 2007 when Palo Alto Networks introduced the core feature sets that define what we consider today as a next generation firewall, the technology has been embraced by the marketplace. According to a joint study by Infiniti Research and TechNavio Insights, next-gen firewalls accounted for 5-10 percent of total firewall appliances in 2010. That figure is predicted to jump to 35 percent by 2014.<\/p>\n<p>For businesses the attraction is twofold. Application-based controls and enhanced security are the must-haves, but that those arrive with overall cost savings and reduced management overhead is the icing on the cake. Performance bugs are still being ironed out. This level of added security comes at a performance price, and many businesses are unwilling to compromise connections per second and optimal traffic rates. True next-gen firewalls also require purpose-built appliances \u2013 simply modifying older equipment does not deliver the same performance. As these issues are resolved and the technology matures, the market will continue to grow.<\/p>\n<p>It won&#8217;t take long for the threat environment to answer with new challenges and exploits&#8230; it never does. But for a while at least, next generation firewalls have convincingly achieved the upper-hand in managing individual user and network security.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The primal contest between computer user security and the external threat environment will shift with next generation firewalls. Significantly upgraded over the previous state-of-the-art, next-gen firewalls offer improved visibility into the contemporary Web-based network landscape and a much-enhanced capacity to detect advanced threats. But is this truly a generational performance enhancement, or just the same [&hellip;]<\/p>\n","protected":false},"author":442,"featured_media":1342,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_s2mail":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6],"tags":[89,76],"class_list":["post-1330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","tag-next-gen-firewalls","tag-technology-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.4 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Yardi Blog<\/title>\n<meta name=\"description\" content=\"The primal contest between computer user security and the external threat environment will shift with next generation firewalls. Significantly upgraded\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Next Generation Firewalls\" \/>\n<meta property=\"og:description\" content=\"The primal contest between computer user security and the external threat environment will shift with next generation firewalls. Significantly upgraded\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/\" \/>\n<meta property=\"og:site_name\" content=\"Yardi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-13T12:00:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-12-24T08:18:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"230\" \/>\n\t<meta property=\"og:image:height\" content=\"185\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yardi Blog Staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yardi Blog Staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/\",\"url\":\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/\",\"name\":\"Next Generation Firewalls - Yardi Corporate Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg\",\"datePublished\":\"2012-04-13T12:00:55+00:00\",\"dateModified\":\"2020-12-24T08:18:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/12d209262af43d800c30fba2abaa9d23\"},\"description\":\"The primal contest between computer user security and the external threat environment will shift with next generation firewalls. Significantly upgraded\",\"breadcrumb\":{\"@id\":\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#primaryimage\",\"url\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg\",\"contentUrl\":\"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg\",\"width\":\"230\",\"height\":\"185\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.yardi.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Next Generation Firewalls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#website\",\"url\":\"https:\/\/www.yardi.com\/blog\/\",\"name\":\"Yardi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.yardi.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/12d209262af43d800c30fba2abaa9d23\",\"name\":\"Yardi Blog Staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4796c721c2ceb2c229dd6e9907b4e76da4dd06914020409d763157a7b7ed473e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4796c721c2ceb2c229dd6e9907b4e76da4dd06914020409d763157a7b7ed473e?s=96&d=mm&r=g\",\"caption\":\"Yardi Blog Staff\"},\"url\":\"https:\/\/www.yardi.com\/blog\/author\/yardi-blog-staff\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Yardi Blog","description":"The primal contest between computer user security and the external threat environment will shift with next generation firewalls. Significantly upgraded","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Next Generation Firewalls","og_description":"The primal contest between computer user security and the external threat environment will shift with next generation firewalls. Significantly upgraded","og_url":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/","og_site_name":"Yardi Blog","article_published_time":"2012-04-13T12:00:55+00:00","article_modified_time":"2020-12-24T08:18:07+00:00","og_image":[{"width":230,"height":185,"url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg","type":"image\/jpeg"}],"author":"Yardi Blog Staff","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Yardi Blog Staff","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/","url":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/","name":"Next Generation Firewalls - Yardi Corporate Blog","isPartOf":{"@id":"https:\/\/www.yardi.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#primaryimage"},"image":{"@id":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#primaryimage"},"thumbnailUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg","datePublished":"2012-04-13T12:00:55+00:00","dateModified":"2020-12-24T08:18:07+00:00","author":{"@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/12d209262af43d800c30fba2abaa9d23"},"description":"The primal contest between computer user security and the external threat environment will shift with next generation firewalls. Significantly upgraded","breadcrumb":{"@id":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#primaryimage","url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg","contentUrl":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg","width":"230","height":"185"},{"@type":"BreadcrumbList","@id":"https:\/\/www.yardi.com\/blog\/next-generation-firewalls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.yardi.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Next Generation Firewalls"}]},{"@type":"WebSite","@id":"https:\/\/www.yardi.com\/blog\/#website","url":"https:\/\/www.yardi.com\/blog\/","name":"Yardi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.yardi.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/12d209262af43d800c30fba2abaa9d23","name":"Yardi Blog Staff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.yardi.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4796c721c2ceb2c229dd6e9907b4e76da4dd06914020409d763157a7b7ed473e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4796c721c2ceb2c229dd6e9907b4e76da4dd06914020409d763157a7b7ed473e?s=96&d=mm&r=g","caption":"Yardi Blog Staff"},"url":"https:\/\/www.yardi.com\/blog\/author\/yardi-blog-staff\/"}]}},"jetpack_featured_media_url":"https:\/\/www.yardi.com\/blog\/wp-content\/uploads\/sites\/15\/2012\/04\/protectdata-feat.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/1330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/users\/442"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/comments?post=1330"}],"version-history":[{"count":8,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/1330\/revisions"}],"predecessor-version":[{"id":26753,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/posts\/1330\/revisions\/26753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media\/1342"}],"wp:attachment":[{"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/media?parent=1330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/categories?post=1330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yardi.com\/blog\/wp-json\/wp\/v2\/tags?post=1330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}