Story image

Why you should leverage a next-gen firewall platform

13 Nov 18

Article by Hillstone Networks CTO Tim Liu

A next-generation firewall platform (NGFW) addresses the ever-changing landscape of threats with expanded features and partnerships to close the loop on cyber attacks—from the enterprise network to the cloud.

These offer different levels of protection in three critical stages: pre-breach, breach, and post-breach. Here are the main five security features of next-generation firewalls:

Full lifecycle-based threat detection and prevention

It is important to provide an organisation with a multi-layered defence across the entire threat lifecycle while enabling different levels of protection in three critical stages: pre-breach, breach, and post-breach.

Through full lifecycle-based threat detection and prevention, organisations are able to manage the entire threat lifecycle without adding additional solutions.

Each of the threat lifecycle stages has its own set of risks—so they need to be addressed with the following:

  • IP reputation: Identify and filter traffic from risky IPs such as botnet hosts, spammers, Tor nodes, breached hosts, and brute force attacks
  • Botnet Command and Control (C&C) detection: Discover intranet botnet hosts by monitoring C&C connections, blocking further advanced threats such as botnet and ransomware
  • Enhanced Cloud Sandbox: Support the static analytic only mode which will execute static MD5 detection without uploading the file to the cloud, leveraging more than 1 billion malicious file samples, exponentially increasing the known virus detection rate.

The importance of IPv6 in network security

The transition from IPv4 to IPv6 brings up more security challenges to the network, and it requires that the modern NGFW can provide comprehensive visibility, deep security, and advanced configuration capabilities across a combination of IPv4 and IPv6 traffic.

While full migration to IPv6 is a matter of time, it is better to be ready now to make the move to better security.

  1. Full security for IPv6: application identification and control, firewall, IPS, Anti-virus, URL filtering etc.
  2. Networking adaptability: IPv6 tunnelling, DNS64/NAT64, and more, IPv6 routing protocols, static routing, policy routing, ISIS, RIPng, OSPFv3 and BGP4+, IPSec. vSYS, and more
  3. Ease of Operations and Management: web UI support provides easier configuration, IPv6 traffic monitoring, and advanced statistic and logging

Enhanced authentication and access control in more scenarios

It is key to enable organisations to support more advanced authentication scenarios required when supporting workforces across all devices.

With such a feature, organisations are enabled to embrace the challenges of modern authentication and access control in support of improved workforce productivity.

  • Support MAC-based wireless user authentication: For better connectivity and security in DHCP scenarios
  • Improve endpoint identification and control: detects all endpoint accesses to the network, identify their statuses and related information, and perform the necessary controls for unauthorised accesses like unauthorized hotspots
  • Optimised web authentication: The optimised authentication configurations and logic improve the overall user experience

Advanced network operation and management capability

It is important to streamline time-consuming administrative tasks, including traffic monitoring, policy configuration, and execution, relieving network admins to focus on the business and less on daily maintenance tasks.

Netflow: Support Netflow protocol v9.0 to collect data, and send network traffic to external platforms for traffic analytics and monitoring.

  • Advanced policy groups: Enables policy management in groups, providing admins of large enterprises to manage large amounts of policies in a more efficient manner
  • Policy configuration rollback: Provides the ability to rollback policy configurations without rebooting the device, allowing admins to tune their configurations efficiently

Better, more robust protection for cloud infrastructures

Improve and simplify the protection of cloud or multi-cloud infrastructures by removing several challenges for customers wanting to migrate to more modern cloud infrastructures.

Ensure cloud deployment is highly available and that connections between the various cloud platforms are protected.

  • Introduce a high-performance model to meet more user scenarios, single imaging for different models, with a seamless upgrade without reinstallation
  • Ensure high availability for Cloud protection
  • Support an IKEv2-enabled, secured VPN connection between clouds
How Adobe aims to drive digital transformation for financial services
Digital transformation is a requirement for ongoing competitiveness that clearly helps businesses run more efficiently.
Using blockchain to ensure regulatory compliance
“Data privacy regulations such as the GDPR require you to put better safeguards in place to protect customer data, and to prove you’ve done it."
Human value must be put back in marketing - report
“Digital is now so widely adopted that its novelty has worn off. In their attempt to declutter, people are being more selective about which products and services they incorporate into their daily lives."
A10 aims to secure Kubernetes container environments
The solution aims to provide teams deploying microservices applications with an automated way to integrate enterprise-grade security with comprehensive application visibility and analytics.
DigiCert conquers Google's distrust of Symantec certs
“This could have been an extremely disruptive event to online commerce," comments DigiCert CEO John Merrill. 
Microsoft NZ bids Goldie a “fond farewell”
Microsoft New Zealand director of commercial and partner business takes new role across the Tasman. The search for his replacement has begun.
Google says ‘circular economy’ needed for data centres
Google's Sustainability Officer believes major changes are critical in data centres to emulate the cyclical life of nature.
One Identity a Visionary in Magic Quad for PAM
One Identity was recognised in the Gartner Magic Quadrant for Privileged Access Management for completeness of vision and ability to execute.