SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper 1
Next-Generation Firewall
Buyer’s Guide
The Definitive Guide for Evaluating Enterprise ­
Network Firewalls
The rapid evolution of IT has changed the face of the network perimeter.
Data and users are everywhere. New devices are joining the network and
proliferating more quickly than most organizations can keep up, sometimes
without notice. At the same time, IT teams are adopting the cloud, big
data analytics, machine learning, and automation to accelerate delivery of
new applications to drive business growth. Meanwhile, applications are
increasingly accessible. The result is an incredibly complex network that
introduces significant business risk. Organizations must minimize this risk
without slowing down their business.
2
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
Traditional cybersecurity is falling behind as attacks are con-
stantly and automatically morphing. Spending on security feels
endless, and the reduction of risk is unclear. Deploying dispa-
rate, non-integrated tools and technologies leaves your busi-
ness exposed to threats. Security tools that weren’t designed
for automation require analysts to manually stitch together in-
sights from many disconnected sources before acting. We need
a new, disruptive approach.
It starts with a next-generation firewall platform as the corner-
stone of an effective network security strategy. With a preven-
tion-focused architecture, security teams can easily adopt best
practicestoproactivelypreventsuccessfulattacks,useautoma-
tion and analytics to reduce manual effort, replace disconnect-
ed point products, and deploy tightly integrated innovations
that strengthen and simplify security.
This paper describes the evolution of the firewall to “next-gen-
eration,” highlights critical capabilities a next-generation
firewall must have to secure your network and your business,
and provides key questions you should ask during the re-
quest-for-proposal (RFP) process as you formally evaluate
your next next-generation firewall.
The Evolution of the Next-­
Generation Firewall
Early on, stateful inspection firewalls classified traffic by look-
ing only at the destination port, such as TCP port 80 for HTTP.
As the need for application awareness arose, many vendors
added application visibility and other software or hardware
“blades” into their stateful inspection firewalls, which they
subsequently sold as unified threat management (UTM) of-
ferings. However, since their functions were retrofitted—not
natively integrated—UTMs did not improve security.
Unlike UTM offerings, next-generation firewalls are applica-
tion-aware and make decisions based on application, user, and
content. The integrated design improves security and simplifies
operations. Given the model’s success, the term “next-genera-
tion firewall” is now synonymous with “firewall.”
Over the last decade, many security vendors have focused on
reducing the time it takes to react to new attacks, new devices,
and a need for policy changes—from weeks to days, hours, and
in some cases, even minutes. However, only shortening reaction
times is becoming unproductive given how rapidly attacks, de-
vices, and environments are changing. The next evolution of the
next-generation firewall will require network security solutions
that proactively deliver protection against tomorrow’s threats.
Next-generation firewall selection criteria typically fall into
three areas: security functions, operations, and performance.
The security functions correspond to the efficacy of the security
controls and your team’s ability to manage the risk associated
with the applications traversing your network, without slowing
down the business. From an operations perspective, applica-
tion policy should be accessible and simple to manage, apply-
ing ­
automation to reduce manual effort so security teams can
focus on high-value activities. Performance criteria are simple:
the firewall must do what it’s supposed to do at the required
throughput for your business needs. As part of this, innova-
tions should be tightly integrated and easy to adopt. Although
requirements and priorities will vary within these criteria, there
are certain capabilities your next firewall must have.
15 Things Your Next-Generation
Firewall Must Do
1. Identify Users and Enable Appropriate Access
The Problem
Employees, customers, and partners connect to different re-
positories of information within your network, as well as to
the internet. These people and their many devices represent
your network’s users. It’s important for your organization’s
security posture that you’re able to identify your users be-
yond IP address as well as grasp the inherent risks they bring
based on the devices they’re using—especially when securi-
ty policies have been circumvented or new threats have been
introduced to your network.
Figure 1: Users access data from
different devices and locations
1.	 Adam Hils, Jeremy D’Hoinne, Rajpreet Kaur, “Magic Quadrant for Enterprise Network Firewalls,” Gartner, July 10, 2017,
https://www.gartner.com/en/documents/3757665/­
magic-quadrant-for-enterprise-network-firewalls.
Gartner predicted that, by the end of 2019, 90%
of ­
enterprise internet connections for the installed
base would be secured with next-generation
­firewalls.1
Next-Generation Firewall Requirements
•	 Identify applications regardless of port, protocol,
evasive tactics, or encryption.
•	 Identify users regardless of device or IP address.
•	 Decrypt encrypted traffic.
•	 Protect in real time against known and unknown
threats embedded in applications.
•	 Deliver predictable, multi-gigabit, inline throughput.
Home
PC
Work
laptop
BYOD
phone
User
Branch
Home On the go
HQ
Public cloud
SaaS Data center
Internet
3
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
In addition, users are constantly moving to different physical
locations and using multiple devices, operating ­
systems, and
application versions to access the data they need. IP address
subnets are mapped only to physical locations, not individual
users, meaning that if users move around—even within the of-
fice—policy doesn’t follow them. Finally, user directories don’t
include behavioral characteristics, so a user’s risk profile can
changeorcredentialscanbecomecompromised,yettheuserre-
tainsthesamelevelofaccesssimplybasedonrole.Sinceuserdi-
rectory changes take time, risky or malicious activity can go un-
checked and increase the risk to which an enterprise is exposed.
Addressing the Problem
User and group information must be directly integrated into
the technology platforms that secure modern organizations.
Your next firewall must be able to pull user identity from
multiple sources, including virtual private networks (VPNs),
wireless local area network (WLAN) access controllers, direc-
tory servers, email servers, and captive portals. Knowing who
is using the applications on your network, and who may be
transmitting a threat or transferring files, strengthens secu-
rity policies and improves incident response times.
Your firewall must allow policies to safely enable applications
based on users or groups of users, outbound or inbound—for
example, by allowing only your IT department to use tools
such as SSH, telnet, and FTP. User-based policies follow users
no matter where they go—at headquarters, branch offices, or
home—and on whatever devices they use. However, develop-
ing policies based on user information in the directory is not
sufficient. You should be able to dynamically change user ac-
cess based on changes in circumstances, whether the change
is due to new indicators of compromise (IOCs) or a business
need, such as granting temporary access to a set of users.
2. 
Prevent Theft and Abuse of Corporate
­Credentials
The Problem
Users and their credentials are among the weakest links in
an organization’s security infrastructure. According to the
2019 Data Breach Investigations Report by Verizon, in the
12-month period covered in the report, 29% of hacking-­
related breaches took advantage of stolen and/or weak pass-
words.2
With stolen credentials as part of their toolset, attack-
ers’ chances of successfully breaching go up, and their risk of
getting caught goes down. To prevent credential theft, most
organizations rely on employee education, which is prone to
human error by nature. Technology products commonly rely
on identifying known phishing sites and filtering email.
However, these methods can sometimes be bypassed—
checking for known bad sites misses newly created ones,
and attackers can evade mail filtering technology by sending
links through social media. Attackers can easily steal creden-
tials through phishing, malware, social engineering, or brute
force, and can even buy them on the dark web. Attackers use
these credentials to gain access to a network, move ­
laterally,
and escalate their privileges for unauthorized access to appli-
cations and data.
Addressing the Problem
Organizations should look for a firewall with machine learn-
ing-based analysis to identify websites that steal creden-
tials. If the analysis identifies a site as malicious, the fire-
wall should be updated and block it. Still, there will always
be new, ­
never-before-seen phishing sites that are treated
as ­
“unknown.” Your next firewall must allow you to block
submission of corporate credentials to unknown sites. The
firewall must also allow you to protect sensitive data and ap-
plications by enforcing multi-factor authentication (MFA)
to prevent attackers from abusing stolen credentials. By in-
tegrating with common MFA vendors, your firewall can pro-
tect your applications containing sensitive data, including
legacy applications.
3. Safely Enable All Apps and Control Functions
The Problem
More and more applications, such as instant messaging
­
applications, peer-to-peer file sharing, or voice-over-IP,
are capable of operating on nonstandard ports or hopping
ports. ­Additionally, users are accessing diverse types of apps,
­­
including software-as-a-service (SaaS) apps, from varying
­
devices and locations. Some of these apps are sanctioned,
some ­
tolerated, and others unsanctioned, and users are
­
increasingly ­
savvy enough to force applications to run over
nonstandard ports through protocols such as RDP and SSH.
Further, new applications provide users with rich sets of
functions that help ensure user loyalty but may represent
different risk profiles. For example, WebEx®
is a valuable
business tool, but using WebEx desktop sharing to take over
an employee’s desktop from an external source may be an
internal or regulatory compliance violation. Gmail®
and
Google Drive are other good ­
examples. Once users sign in
to Gmail, which may be allowed by policy, they can easily
switch to YouTube®
or Google Photos, which may not be al-
lowed. Security administrators want complete control over
usage of these apps and set policy to allow or control cer-
tain types of applications and application functions while
denying others.
2.	 “2019 Data Breach Investigations Report,” Verizon, 2019, https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf.
29% of breaches due to
compromised passwords
Figure 2: Verizon 2019 DBIR
finding on stolen credentials
4
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
Addressing the Problem
Your next firewall must classify traffic by application on all
ports, all the time, by default—and it should not burden you
with researching common ports used by each application.
The firewall must provide complete visibility into application
usage along with capabilities to understand and control their
use (see figure 3). For example, it should understand usage of
application functions, such as audio streaming, remote ac-
cess, and posting documents, and be able to enforce granu-
lar controls over that usage, such as upload versus download
permissions, chat versus file transfer, and so on. This must
be done continuously. One-and-done traffic classification is
not an option as it ignores the fact that these commonly used
applications share sessions and support multiple functions.
If a different function or feature is introduced in the session,
the firewall must perform a policy check again. Continuous
state tracking to understand the functions each application
may support—and the different associated risks—is a must
for your next firewall.
4. Close Dangerous Policy Gaps
The Problem
Legacy firewalls allow and block traffic based on ports and IP
addresses. This approach is inadequate as port-based rules
allow both good and bad applications through the firewall.
Applications can easily go through a port-based firewall by
hopping between ports, using SSL and SSH, or using well-
known open ports such as 80 and 443. Over time, customers
accumulate thousands of port-based rules on their firewalls,
and often migrate these rules as-is to their next-generation
firewalls. These rules leave dangerous policy gaps. Custom-
ers realize that they must migrate to application-based rules
for effective security, but this requires significant manual
effort—and due to the cybersecurity skills shortage, most
organizations do not have the resources. This becomes a
high security risk that may cause a business disruption. In
fact, according to Gartner, through 2023, 99% of firewall
breaches will be caused by firewall misconfigurations, not
firewall flaws.3
Addressing the Problem
When evaluating your next firewall, look for one that re-
duces the complexity of rule and policy management. This
begins with showing you what applications are running on
your network, mapping them to the legacy rules, and helping
replace the legacy rules. A next-generation firewall should
help your security team easily replace legacy rules with in-
tuitive, application-based policies. Because rules based on
application identification are easy to create, understand,
and modify as business needs evolve, they minimize con-
figuration errors that leave you vulnerable to data breaches.
These policies strengthen security and take significantly less
time to manage. Finally, your next firewall should aggregate
telemetry information and apply machine learning to auto-
matically identify required policy and configuration chang-
es. These capabilities can improve security policy optimiza-
tion to eliminate breaches due to misconfiguration.
5. Secure Encrypted Traffic
The Problem
Most enterprise web traffic today is encrypted, and attackers
exploit encryption to hide threats from security surveillance.
This means even businesses with mature, comprehensive
security measures in place can be breached if they are not
monitoring encrypted traffic. Additionally, TLS/SSL encryp-
tion is used nearly universally, and end users can easily con-
figure it to hide non-work-related activity.
Addressing the Problem
The ability to decrypt TLS/SSL-encrypted traffic is a founda-
tional security function. Key elements to look for include rec-
ognition and decryption on any port, inbound or outbound;
policy control over decryption; and the necessary hardware
and software elements to perform decryption across tens of
thousands of simultaneous SSL connections without com-
promising performance. However, your next firewall must
be flexible enough to easily decrypt certain types of encrypt-
ed traffic (e.g., HTTPS from unclassified websites) via ­
policy,
Figure 3: Control application usage in policy
Download
File transfer
Upload
Screen sharing/
remote control
Posting
Document
sharing
Audio and video
Files sandboxing
WildFire
.EXE
.RAR
.XLS
.PDF
.EXE
.RAR
.XLS
.PDF
select select
Enterprise vs.
consumer accounts
File blocking
Application
3.	 Rajpreet Kaur, Adam Hils, John Watts, “Technology Insight for Network Security Policy Management,” Gartner, February 21, 2019,
https://www.gartner.com/doc/3902564/technology-insight-network-security-policy.
5
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
while other types (e.g., web traffic from known financial ser-
vices organizations) are left alone in compliance with pri-
vacy standards. A next-generation firewall should apply se-
curity and load balancing to decrypted flows across multiple
stacks of security devices for additional enforcement. This
eliminates dedicated SSL offloaders, reducing network com-
plexity and making decryption simpler to operate. It must
also offer support for decryption of modern protocols like
TLS 1.3 and HTTP/2 that are gaining widespread adoption.
Read Decryption: Why, Where, and How for a detailed over-
view of this important capability.
6. 
Stop Advanced Threats to Prevent
­Successful Cyberattacks­
The Problem
Most modern malware—including ransomware variants—
uses advanced techniques, such as wrapping malicious pay-
loads in legitimate files or packing files to avoid detection,
to transport attacks or exploits through network security
devices and tools. As organizations have increasingly de-
ployed virtual sandboxes for dynamic analysis, attackers
have evolved to focus on ways to evade them. They employ
techniques that scan for valid user activity, system configu-
rations, or indicators of specific virtualization technologies.
With the growth of the cybercrime underground, even a nov-
ice attacker can purchase plug-and-play threats designed to
identify and avoid malware analysis environments.
Addressing the Problem
Your firewall, using integrated security services, should auto-
matically prevent known threats. Unknown threats need to be
automatically analyzed and countered, too. Where possible,
unknown file- or web-based threats should be blocked inline.
In the remaining cases, your organization needs a service that
can contextualize behaviors through robust analytics and in-
tegration with other parts of your security infrastructure to
identify threats at all points within the cyberattack lifecy-
cle, not just when threats first enter your network. Blocking
known risky file types or access to malicious URLs before
they compromise your network reduces your threat exposure.
Your firewall should protect you from known vulnerability
exploits, malware, and command-and-control (C2) activ-
ity without requiring you to manage or maintain multiple
­
single-function appliances. Signatures should be updated au-
tomatically and distributed to all enforcement points as soon
as new malware is encountered, keeping you protected while
allowing your security and incident response teams to focus
on the things that matter.
A next-generation firewall that utilizes inline machine
learning-based prevention and multiple methods of cloud
analysis to detect unknown threats, including static analy-
sis with machine learning, dynamic analysis, and bare metal
analysis, is capable of high-fidelity, evasion-resistant dis-
covery. Rather than signatures based on specific attributes,
firewalls should use predictive machine learning models
resident on the firewall or content-based signatures to de-
tect variants, polymorphic malware, or C2 activity. In addi-
tion, C2 signatures based on analysis of outbound communi-
cation patterns are much more effective protective measures
that can scale at machine speed when created automatically.
Finally, cloud-delivered security infrastructure is critical for
security enforcement. It supports threat detection and pre-
vention at massive scale across your network, endpoints,
and clouds in addition to allowing you to tap into an open
ecosystem of trusted innovators.
7. Stop Attacks That Use DNS
The Problem
DNS is a massive, often overlooked channel that can be used
for malware delivery, C2, and data exfiltration. Adversaries
take advantage of the widespread nature of DNS to abuse it at
Vulnerability
exploit
Malware
installation
Command
and control
Lateral
movement
Data
exfiltration
Figure 5: Disruption at every step
to prevent successful attacks
97% of time spent on
pages that use HTTPS
Time Spent on Encrypted
Websites and Apps
96% of pages are
loaded on HTTPS
Figure 4: Google 2019 findings
on encrypted traffic4
4.	 “Google Transparency Report: HTTPS encryption on the web,” Google, Inc., accessed February 5, 2020, https://transparencyreport.google.com/
https/overview?hl=en.
6
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
9. 
Extend Security to Your Evolving Cloud
­Environments
The Problem
Data and applications reside everywhere—in your network
and in the cloud. According to the RightScale 2019 State of the
Cloud Report™, 84% of enterprises use multiple public, pri-
vate, and/or hybrid clouds—five different clouds on ­
average.5
Compounded with SaaS environments, organizations must
now secure sensitive data in the network and a variety of
cloud environments. In addition, legacy security tools and
techniques designed for static networks weren’t designed to
work with cloud native tools or capabilities. Moreover, na-
tive security services from the cloud providers themselves,
such as Google Cloud Platform (GCP®
), Amazon Web Services
(AWS®
) and Microsoft Azure®
, typically provide only Layer 4
protections and are specific to that cloud provider.
Addressing the Problem
To succeed, your organization needs cloud security that ex-
tends policy consistently from the network to the cloud, stops
malware from accessing and moving laterally (east-west)
within the cloud, simplifies management, and minimizes
the security policy lag as cloud workloads change. Your next
firewall must protect the resident applications and data with
the same security posture you may have established on your
physical network. To secure multi-cloud deployments, the
firewall must support a variety of cloud and virtualization en-
vironments, including all major public clouds and virtualized
private clouds. The firewall must integrate with native cloud
services, such as AWS Lambda and Azure, and automation
tools, such as Ansible®
and Terraform®
, to integrate security
into your cloud-first development projects.
10. Use a Zero Trust Strategy
The Problem
Conventional security models operate on the outdated assump-
tion that everything inside an organization’s network can be
trusted. These models are designed to protect the perimeter.
Meanwhile, threats that get inside the network go unnoticed
and are left free to compromise sensitive, valuable business
data. In the digital world, trust is nothing but a vulnerability.
multiple points of an attack. According to Palo Alto Networks
Unit 42 threat research team, almost 80% of malware uses DNS
as a way to establish communication with a C2 server. Attack-
ers establish reliable command channels that are difficult to
take down or identify since DNS is such a reliable way to main-
tain a connection to DNS servers. Once a connection is estab-
lished, attackers can use DNS traffic to deliver malware into
a network or tunnel data out. Additionally, attackers ­
develop
domain generation algorithms (DGAs), which automatically
create thousands of malicious domains that can be used for C2.
As adversaries increasingly automate their attacks, it becomes
almost impossible to identify and stop these threats.
Addressing the Problem
Your organization cannot simply add attacks that use DNS to
the block list as this tactic often relies on relatively static threat
feeds that work off known bad domains. Without analytics, it
is impossible to predict highly dynamic malicious domains.
Stopping attacks that use DNS requires a next-generation fire-
wall that can apply predictive analytics and machine learning
to identify unknown bad domains dynamically.
8. Protect Your Growing Mobile Workforce
The Problem
The mobile workforce continues to grow along with the use of
mobiledevicestoconnecttobusinessapplications,oftenthrough
public networks and devices that are open to advanced threats.
This increases risk when users are off-premises ­
because there
is no network firewall to stop attacks, and the issue becomes
even more complex when considering the effects of cloud and
bring-your-own-device (BYOD) practices. In addition, remote
locations and small branch offices often lack consistent security
because it is operationally inefficient and costly to ship firewalls
to them or backhaul traffic to headquarters.
Addressing the Problem
The mobile workforce and remote locations need access to
applications from places far beyond your network. They also
need protection from targeted cyberattacks, malicious appli-
cations and websites, phishing, C2 traffic, and other unknown
threats. This requires consistent security. Your next firewall
must enable the required levels of visibility, threat preven-
tion, and security policy enforcement to protect your distrib-
uted users and locations by delivering next-generation fire-
wall capabilities from the cloud, securing them without the
need to deploy physical hardware.
5. “RightScale 2019 State of the Cloud Report,” Flexera, February 2019, https://resources.flexera.com/web/media/documents/rightscale-2019-state-of-the-
cloud-report-from-flexera.pdf.
Holistic Coverage for All Operating Systems
Given the onslaught of BYOD initiatives and an
­
increasingly mobile workforce, holistic coverage
across ­Windows®
, macOS®
, Android®
, and Linux envi-
ronments and workloads is critical. Holistic coverage
­
allows organizations to confidently prevent known
and unknown malware ­
regardless of which operating
systems their users prefer.
84% of enterprises have
a multi-cloud strategy
Figure 6: RightScale findings
on multi-cloud strategy
7
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
incidents. Your reporting capabilities must let your security
personnel drill down into network, application, and user be-
havior for the context they need to make informed decisions.
When these capabilities are delivered from the cloud, your
teams can get the networking and security needed in an ar-
chitecture designed for everything: traffic, applications, and
users, no matter their location. In today’s constantly chang-
ing threat landscape, using a single security vendor to ad-
dress the vast spectrum of your security and business needs
may not be practical. In this case, the ability to integrate with
and consume third-party insight and innovation is critical.
When evaluating security vendors, be sure to evaluate the
flexibility, extensibility, and programmability of what they
offer. Read this e-book to learn about a new approach to
securing cloud-enabled organizations as well as delivering
speed and agility to enterprise networking and security.
12. 
Automate Routine Tasks and Focus on the
Threats That Matter
The Problem
In a 2018 report, Cybersecurity Ventures estimated that
there would be 3.5 million unfilled cybersecurity jobs by
2021.7
This is compounded by a dependency on too many
manual processes for day-to-day security operations, such
as chasing down data, investigating false positive alerts,
and managing remediation. Manually analyzing and cor-
relating the vast number of security events slows mitiga-
tion, increases the chance for error, and is difficult to scale.
Security teams can easily drown in the volume of alerts
and miss the critical, actionable ones. The looming short-
age of skilled cybersecurity professionals only exacerbates
this. Although big data analytics uncovers hidden patterns,
correlations, and other insights to provide security teams
with actionable intelligence, you still need the right data.
That data must be sourced from everywhere—networks,
endpoints, SaaS applications, public clouds, private clouds,
data centers, and so on—and be ready for analytics.
Addressing the Problem
When evaluating a next-generation firewall, consider a fire-
wall that can act as a segmentation gateway to enable a Zero
Trust architecture. Zero Trust is a cybersecurity strategy that
eliminates the notion of trust. In a Zero Trust world, there
are no trusted devices, systems, or people. You identify the
data, assets, applications, and services most critical to the
business, determine who or what should have access based
on their specific job function, and enforce a least-privileged
access model through network segmentation, granular Layer
7 security policy, user access control, and threat prevention.
Your next firewall should directly align with Zero Trust, in-
cluding enabling secure access for all users irrespective of
location, inspecting all traffic, enforcing policies for least-­
privileged access control, and detecting and preventing ad-
vanced threats. This significantly reduces the pathways for
adversaries, whether they are inside or outside your organi-
zation, to access your critical assets. Watch this webinar to get
insight into effectively implementing Zero Trust.
11. 
Maintain Consistent Access Control and
­
Policy Across Clouds and On-Premises,
­
Remote, and Mobile Networks
The Problem
Organizations have adopted a wide range of point products to
address different network and security requirements for appli-
cations hosted on-premises, in cloud environments, or both.
However, for each product comes a separate policy and inter-
face to manage, creating extra costs, complexity, and gaps in
security. Additionally, these products are not integrated and
cannot share insights into network access, application access,
or policy violations, nor can they provide consolidated logs.
Organizations also find it challenging to onboard new fire-
wall appliances at scale, maintain consistent security policies,
and deploy policy changes across thousands of firewalls. This
approach causes gaps in security and network performance,
leading to staff and cost shortages.
Addressing the Problem
According to ESG Research, 66% of organizations are active-
ly consolidating the number of cybersecurity vendors with
which they do business.6
To be successful, firewall solutions
must deliver security capabilities in a variety of form fac-
tors—hardware, software, and containerized—to integrate
security protections into the optimal parts of the environ-
ment. You must be able to operationalize the deployment
of consistent, centralized security policies across tens of
thousands of firewalls spanning on-premises and cloud de-
ployments—including remote locations, mobile users, and
SaaS applications—through centralized management, con-
solidated core security tasks, and streamlined capabilities.
For example, you should be able to use a single console to
view all network traffic, manage configurations, push global
policies, and generate reports on traffic patterns or security
66% of organizations are actively
consolidating cybersecurity vendors
Figure 7: ESG Research findings on
cybersecurity vendor consolidation
6.	 “The Cybersecurity Technology Consolidation Conundrum, March 26, 2019, https://www.esg-global.com/blog/the-cybersecurity-technology-consolidation-conundrum.
7. 	 “Cybersecurity Jobs Report 2018-2021,” Cybersecurity Ventures, November 28, 2018, https://www.herjavecgroup.com/wp-content/uploads/2018/11/HG-and-CV-
Cybersecurity-Jobs-Report-2018.pdf.
8
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
understand one slice of your infrastructure produce sub-
optimal results. They limit the application of analytics and
force security analysts to bounce between interfaces to try
to manually piece together attacks—a process that is both
time-consuming and prone to error.
Addressing the Problem
As the number of needed security functions increases, so
does the potential value of platforms/devices that can provide
meaningful integration between them. If your firewall can act
as a sensor and enforcement point for a more comprehensive,
machine-learning driven analytics platform (such as an XDR
solution), your security team will gain both efficacy and effi-
ciency in uncovering, remediating, and preventing sophisti-
cated attacks. Your next firewall should integrate with XDR to
allow both your network and security teams to understand the
full scope of an attack, share threat context and intelligence,
and drive automated response as well as enforcement between
the firewall and other enforcement points.
14. Consolidate Connectivity with Security
As more enterprises embrace digital transformation and move
applications to the cloud, IT teams are challenged to quickly,
reliably, and securely connect corporate locations and branch-
es to critical business resources. Software-defined wide area
networking (SD-WAN) promises to increase bandwidth while
improving connectivity and performance, and organiza-
tions are taking note. According to Gartner, SD-WAN will be
­
included in 75% of WAN infrastructure refreshes by 2020.8
However, while SD-WAN offers many benefits, it also brings
many challenges, such as degraded or bolted-on security,
unforeseen architecture and deployment complexity, and
unpredictable performance.
Addressing the Problem
Your next firewall should extend to your branches the same
consistent secu­
rity that protects your data center and cloud
environments. Organizations can adopt SD-WAN safely by
implementing a firewall that natively integrates with it,
consolidating their connectivity and security. This can also
Addressing the Problem
By using precise analytics to drive automation, you can easily
operate security best practices like Zero Trust, streamline rou-
tine tasks, and focus on business priorities—such as speeding
up application delivery, improving processes, or hunting for
threats. There are three ways to think about automation:
1.	 Workflow automation: The firewall must expose standard
APIs so it can be programmed from other tools and scripts
you may be using. In the cloud, it must integrate with tools
like Ansible and Terraform. In addition, the firewall must
be able to kick off workflows on other devices in your se-
curity ecosystem, using their APIs, without manual in-
tervention. This automation should extend to operation-
alization of rules and threat information in open source
formats, such as Snort or Suricata®
.
2.	 Policy automation: The firewall must be able to adapt pol-
icies to any changes in your environment, such as move-
ment of applications across virtual machines. It must
also be able to ingest threat intelligence from third-party
sources and automatically act on that intelligence.
3.	 Security automation: Your environment must be able to
uncover unknown threats and deliver protections to the
firewall so new threats are blocked automatically.
Some threats remain hidden in data. By looking deeper into
that data across locations and deployment types, you can find
threats that may be lurking in plain sight. With automation,
you can accurately identify threats, enable rapid prevention,
improve efficiency, better utilize the talent of your specialized
staff, and improve your organization’s security posture.
13. 
Coordinate Detection and Analytics with
Other Security Tools
The Problem
Advanced adversaries don’t limit themselves to one part
of your architecture. Instead, their goal is to move lateral-
ly from endpoints to your network, clouds, and other data
structures to access and exfiltrate valuable data. With this
in mind, siloed security approaches that can only see and
75% of WAN infrastructure refreshes
will include SD-WAN by 2020
Figure 9: Gartner findings on SD-WAN adoption
Cybersecurity job
openings by 2021
3.5M
Figure 8: Cybersecurity Ventures
findings on cybersecurity jobs
9
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
help maintain consistent security policies from the net-
work core out to branches. With SD-WAN configuration and
monitoring as well as firewall user and application policy
workflows available through a single pane of glass, organi-
zations can avoid gaps in their security posture as well as
benefit from improved security, simplicity, and efficiency.
Read this e-book to learn how to achieve consistent security
with SD-WAN.
15. Reduce Exposure IoT Security Risks
The Problem
According to Unit 42, 30% of devices on enterprise networks
today are internet of things (IoT) devices. These devices
pose a huge cybersecurity risk as they are often shipped with
vulnerabilities and are difficult (or impossible) to patch, yet
have unfettered access to an organization’s network. It can
be challenging to secure these IoT devices for many reasons.
IT is rarely notified of or involved in the purchase and man-
agement of IoT devices. Connected devices are incredibly
diverse, running a variety of operating systems, firmware
versions, and applications. IT teams lack governance over
these devices and may have no means to monitor, manage,
or track vulnerabilities. Security teams find it hard to define
and enforce policies as they don’t know how trusted behav-
ior for a device is defined. Because the useful life of devices
can exceed a vendor’s supported life, many IoT devices with
long lifecycles use legacy operating systems and outdated
applications, and thus IT cannot put third-party agents on
them to secure them.
Addressing the Problem
When evaluating your next firewall, consider a solution that
can identify and classify all IoT devices on your network,
including those never seen before. Your firewall solution
should empower security teams to make decisions quick-
ly with full context for each device, understanding device
identity, risk level, and any behavioral anomalies. The fire-
wall should then offer policy recommendations based on
risk assessment results that can be automatically enforced
natively so that users don’t leave their devices insecure.
Read this article to learn how to keep your organization se-
cure in the age of IoT.
Using the RFP Process to Select a
Next-Generation Firewall
Recommended RFP Questions and
­Considerations
Next-generation firewalls must deliver a wide range of capa-
bilities to provide efficient, effective security while also inte-
grating with other key prevention, detection, and response
tools across the infrastructure. This section translates those
requirements into a comprehensive RFP checklist to help you
evaluate the quality of the firewall platforms you’re consider-
ing. Use this checklist as a starting point, and tailor it to your
company’s needs to ensure you’re able to identify vendors
that can best protect your organization.
Identify Users and Enable Appropriate Access
Can your next-generation firewall…
•	 Provide consistent security policy for mobile users?
•	 Protect users who are not behind a next-generation fire-
wall?
•	 Use multiple physical/virtual firewalls to support an al-
ways-on VPN connection?
•	 Utilize the cloud to bring protection closer to the user?
Prevent Credentials Theft and Abuse
Can your next-generation firewall…
•	 Prevent use of corporate credentials on unknown websites?
•	 Block users from submitting corporate credentials without
storing a copy of the hash in the firewall?
•	 Quickly analyze previously unknown phishing sites and up-
date its protections?
•	 Log user attempts to submit credentials in HTTP post?
•	 Support MFA as part of access-control policy based on the
sensitivity of the resource accessed?
•	 Provide a variety of choices in MFA partner technologies?
•	 Support API integrations with MFA partner technologies?
•	 Support MFA policy for any type of application, including
web, client-server, and terminal applications?
•	 Support MFA capability on any protocol, rather than be
limited to certain protocols?
Safely Enable All Apps and Control Functions
•	 Can your firewall detect applications that can evade detec-
tion using nonstandard ports, port hopping, or by being
configured to run on a different port?
•	 In traffic classification, is the first task the firewall executes
based on application identity or the network port?
•	 Are the application identification mechanisms part of the
core firewall traffic classification (i.e., enabled by default)?
•	 Do the application identification mechanisms depend on
the application’s standard port?
•	 Can the signatures be applied to all ports? Is the process
automatic or manually configured?
•	 When traffic first hits the device, is it first classified based
on port (e.g., port 80, thus assumed to be HTTP) or applica-
tion (e.g., Gmail®
)?
•	 Describe in detail how the firewall can accurately identify
applications:
•	 Which mechanisms, besides signatures, are used to clas-
sify traffic?
•	 Whatisthebreadthofapplicationandprotocoldecoderuse?
8.	 Mike Toussaint, Ted Corbett, Andrew Lerner, “6 Critical Questions to Ask on SD-WAN,” Gartner, June 6, 2018,
https://www.gartner.com/en/documents/3877766/6-critical-questions-to-ask-on-sd-wan.
10
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
•	 How are SSL and SSH decryption and control implemented?
•	 Are the traffic classification mechanisms applied equally
across all ports?
•	 Which mechanisms are used to detect purposely evasive
applications, such as UltraSurf or encrypted P2P?
•	 Is application identification performed in the firewall, or
is it performed in a secondary process, after port-based
classification?
•	 Is application state tracked? If so, how is it utilized to en-
sure consistent control of the application and associated
secondary functions?
•	 Is the identity of the application the basis of the firewall se-
curity policy, or is application control treated as a second-
ary policy element?
•	 How often is the application database updated? Is it a
­
dynamic update or a system reboot upgrade?
Close Dangerous Policy Gaps
•	 Is stateful inspection traffic classification performed sepa-
rately, prior to application identification?
•	 Once an application is identified, how are changes in ap-
plication state monitored, tracked, and used within policy?
•	 How does the application database hierarchy (flat, multi-­
level, other) expose functions within the parent application
for more granular enablement policies?
•	 What levels of control can be exerted over individual applica-
tions and their respective functions?
•	 Can port-based controls be implemented for all applications
in the application database so an administrator can enforce,
by policy, the application and port relationship? For example:
•	 Ensure IT personnel are the only ones allowed to use SSH
and RDP?
•	 Detect and block malware within the application, even on
a nonstandard port?
•	 Which enterprise identity repositories are supported for
­user-based controls?
•	 Is an API available for custom or nonstandard identity-­
infrastructure integration?
•	 How are policy-based controls implemented by users and
groups for terminal services environments?
•	 If any, what are the differences in application enablement
­
options for hardware and virtualized instances?
•	 Does your firewall collect telemetry data for ML-based
security policy optimization to eliminate breaches due to
misconfiguration?
Secure Encrypted Traffic
•	 What is the process by which encrypted applications are
­
identified on all ports, including nonstandard ports?
•	 What policy controls are available to selectively decrypt,
­
inspect, and control applications that are using SSL?
•	 Are bidirectional SSL identification, decryption, and in-
spection supported?
•	 Is SSL decryption a standard feature or an extra cost? Is a
­
dedicated device required?
•	 Is SSH control (a means of accessing remote devices)
­
supported? If so, what is the depth of control?
•	 What mechanisms are used to identify evasive applications,
such as UltraSurf and Tor?
•	 How does the product automatically identify a circumven-
tor that is using a nonstandard port?
Stop Advanced Threats to Prevent Successful Cyberattacks
•	 Does your next-generation firewall deliver machine learn-
ing-based prevention of unknown malware files and vari-
ants, including executables as well as fileless attacks lever-
aging scripts such as PowerShell?
•	 Does your next-generation firewall deliver inline machine
learning-based prevention of malicious website attacks,
including JavaScript or credential phishing attacks?
•	 How quickly does your cloud-based malware analysis sys-
tem distribute signatures after verdict generation?
•	 Does your cloud-based malware analysis system support
multiple analysis techniques, including bare metal analy-
sis, to detect evasive, sandbox-aware malware?
•	 Does your cloud-based malware analysis system use
a custom-coded hypervisor to be effective against
­sandbox-aware malware?
•	 Does your malware analysis system, after analyzing mal-
ware, create threat prevention signatures, such as:
•	 Content-based AV signatures to prevent known and un-
known variants of malware?
•	 Pattern-based anti-spyware signatures to detect com-
munications to known and unknown C2 infrastructure?
•	 Does your cloud-based malware analysis system support
malware analysis for file types of Windows, Android, and
macOS operating systems?
•	 Can your next-generation firewall block executables and
other risky file types from unknown applications and URLs
to prevent ransomware attacks?
•	 Can your next-generation firewall automatically and dy-
namically import all known IOCs (i.e., IPs, domains, and
URLs) into the block list to be proactive against known ran-
somware families?
•	 Does the threat intelligence cloud integration with the
next-generation firewall support dynamic updates for ma-
licious URLs related to ransomware in the malware catego-
ry of the URL filtering database?
•	 Can your next-generation firewall learn about threats or
ransomware behavior from your endpoint protection soft-
ware and vice versa?
Stop Attacks That Use DNS
•	 Does cloud-based threat intelligence integration with the
next-generation firewall support dynamic updates for ma-
licious domains related to ransomware as DNS signatures
to be automatically added to the block list or sinkholed?
11
Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper
Maintain Consistent Access Control and Policy Across
Clouds as Well as On-Premises, Remote, and Mobile
Networks
•	 Does your firewall solution deliver consistent network se-
curity and threat prevention aligned to applications hosted
on-premisesandinvirtualizedandcontainerenvironments?
•	 Does your firewall solution natively deploy within Kuberne-
tes®
­to integrate firewall provisioning into a continuous in-
tegration/continuous development (CI/CD) processes?
•	 Does your firewall integrate into software-defined net-
working (SDN) solutions to extend security protections to
remote locations for branch segmentation and to meet PCI
compliance?
•	 Can local administrators work directly on the appliance and
change configurations as needed without logging in to a
central manager?
•	 Can central administrators monitor and view changes made
by local administrators?
•	 Can you choose which firewall administrator’s configuration
changes should be deployed on the firewalls?
•	 When deployments go wrong, can you quickly roll back
changes from specific users and restore working config-
uration?
•	 Can the central firewall manager separate log management
from core configuration management yet still act as a ­
single
pane of glass for unified visibility?
•	 Can your log managers ingest logs at high throughput (e.g.,
50,000 LPS)?
•	 Does your firewall have APIs for every feature so that you can
automate configuration changes?
Automate Routine Tasks and Focus on the Threats
That Matter
•	 Does your security vendor support the capability to auto-
matically generate prevention signatures across the attack
lifecycle for all data relevant to attacks?
•	 Can your firewall correlate and identify infected hosts in
the network and quarantine them to limit their access in
the network?
•	 Can your firewall trigger MFA to prevent credential abuse
and secure critical applications?
•	 Can your firewall correlate the threats seen in the network
with information obtained from global threat intelligence?
Coordinate Detection and Analytics with Other Security
Tools
Can your next-generation firewall or manager…
•	 Create a ticket on a change management system based on a
malicious event seen on the firewall?
•	 Trigger a quarantine action for an infected host on the
wireless network?
Protect Your Growing Mobile Workforce
•	 In detail, what are the available options for securing remote
users, including all necessary components?
•	 If a client component is included, how is it distributed?
•	 What are your sizing requirements? How many users can be
supported simultaneously?
•	 Is the remote user security feature set transparent to the
client?
•	 How is policy control over remote users implemented (in
firewall policy, in a separate policy/device, etc.)?
•	 Which features and protections are provided by the remote
capabilities (SSL, application control, IPS, etc.)?
•	 Can your firewall keep users connected to ensure consistent
policy enforcement regardless of location?
•	 How do you address mobile device users? Will you be able
to provide consistent policy enforcement whether users are
on external networks or internal wireless networks?
•	 Can the firewall address BYOD issues, such as safely en-
abling corporate and personally owned laptops, phones,
and tablets?
Extend Security to Your Evolving Cloud Environments
•	 How does the next-generation firewall create security pol-
icies based on VM attributes of workloads?
•	 Can the next-generation firewall create security policies for
dynamic workloads in both private and public clouds?
•	 Can the next-generation firewall ensure consistent security
policies for workloads, even when their IP addresses or lo-
cations change in the data center?
•	 In virtualized environments, how is traffic classified
throughout the virtual machine (east-west, north-south)?
•	 What are the points of integration within the virtualized
environment?
•	 What does the process of building security policies for
newly created virtual machines look like?
•	 What features are available to track virtual machine
moves, adds, and changes?
•	 What features are available for integration with automa-
tion and orchestration systems?
Use a Zero Trust Strategy
•	 Does your next-generation firewall enable you to write
­
context-based policy to determine who or what can access
your protect surface?
•	 How does the next-generation firewall leverage network
segmentation, prevent lateral movement, provide Layer 7
threat prevention, and simplify granular user access con-
trol?
•	 Does the next-generation firewall inspect all traffic for
malicious content and unauthorized activity as well as log
through Layer 7, both inside and outside, across the net-
work and cloud environments?
3000 Tannery Way
Santa Clara, CA 95054
Main:	+1.408.753.4000
Sales:	+1.866.320.4788
Support:	+1.866.898.9087
www.paloaltonetworks.com
© 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered
­
trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
marks mentioned herein may be trademarks of their respective companies.
next-generation-firewall-buyers-guide-wp-061620
•	 How does the next-generation firewall enforce security
policies for cloud services and applications delivered to the
branch office?
•	 How does the next-generation firewall improve the securi-
ty of cloud applications and services accessed from a branch
office?
Reduce Exposure to IoT Security Risks
•	 Does your firewall solution provide visibility into all IoT
­
devices in your network, including those never seen before?
•	 How does your firewall solution secure IoT devices against
known and unknown attacks?
•	 Does your firewall offer policy recommendations, based
on risk assessment results, that can be automatically en-
forced?
•	 Can your firewall segment IoT device traffic from the rest
of the network to prevent compromised IoT devices from
becoming beachheads for attacks?
Are you ready to evaluate your next firewall? Take an Ultimate
Test Drive.
Can your next-generation firewall…
•	 Be completely programmed via API?
•	 Collect User-ID information via APIs from wireless
­
controllers about hosts connecting to wireless networks?
•	 Dynamically incorporate third-party or custom threat in-
telligence feeds in the firewall without policy commits?
Does your security architecture…
•	 Support threat feed aggregation, consolidation, and dedu-
plication of threat feeds before pushing the indicators to
your firewall?
•	 Integrate with your next-generation firewall to automate
timeout of expired threat indicators to avoid using stale
threat intelligence?
•	 Allow you to target threat indicators from recent APT cam-
paigns and incorporate threat feeds proactively on your
next-generation firewall?
•	 Allow you to enrich cloud-based threat intelligence and IOCs
with intelligence based on a confidence rating to reduce the
operational overhead from dealing with false positives?
Consolidate Connectivity with Security
•	 What functionality does the next-generation firewall sup-
port to ensure the security of end-to-end communications?
•	 How does the next-generation firewall ensure the security
of direct internet access (DIA)?

Weitere ähnliche Inhalte

Was ist angesagt?

MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...MITRE - ATT&CKcon
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE - ATT&CKcon
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE - ATT&CKcon
 
Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamAdam Pennington
 
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...JamieWilliams130
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsSergey Soldatov
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuNixu Corporation
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Huntsman Security
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021Adrian Sanabria
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
ATT&CKing with Threat Intelligence
ATT&CKing with Threat IntelligenceATT&CKing with Threat Intelligence
ATT&CKing with Threat IntelligenceChristopher Korban
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain OpenDNS
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) MITRE ATT&CK
 
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...MITRE - ATT&CKcon
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablowISSA LA
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!MITRE ATT&CK
 
Emulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceEmulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceAdam Pennington
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communicationscentralohioissa
 

Was ist angesagt? (20)

MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
 
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITREMITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
MITRE ATT&CKcon 2.0: State of the ATT&CK; Blake Strom, MITRE
 
Update from the MITRE ATT&CK Team
Update from the MITRE ATT&CK TeamUpdate from the MITRE ATT&CK Team
Update from the MITRE ATT&CK Team
 
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
 
How MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operationsHow MITRE ATT&CK helps security operations
How MITRE ATT&CK helps security operations
 
Mitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo NixuMitre ATT&CK by Mattias Almeflo Nixu
Mitre ATT&CK by Mattias Almeflo Nixu
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
 
The state of endpoint defense in 2021
The state of endpoint defense in 2021The state of endpoint defense in 2021
The state of endpoint defense in 2021
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
ATT&CKing with Threat Intelligence
ATT&CKing with Threat IntelligenceATT&CKing with Threat Intelligence
ATT&CKing with Threat Intelligence
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
What Happens Before the Kill Chain
What Happens Before the Kill Chain What Happens Before the Kill Chain
What Happens Before the Kill Chain
 
Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?) Automation: The Wonderful Wizard of CTI (or is it?)
Automation: The Wonderful Wizard of CTI (or is it?)
 
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomso...
 
Issa jason dablow
Issa jason dablowIssa jason dablow
Issa jason dablow
 
When Insiders ATT&CK!
When Insiders ATT&CK!When Insiders ATT&CK!
When Insiders ATT&CK!
 
Emulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect IntelligenceEmulating an Adversary with Imperfect Intelligence
Emulating an Adversary with Imperfect Intelligence
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Chris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert CommunicationsChris Haley - Understanding Attackers' Use of Covert Communications
Chris Haley - Understanding Attackers' Use of Covert Communications
 

Ähnlich wie Firewall buyers-guide

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicNetmagic Solutions Pvt. Ltd.
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information securityAhmed Banafa
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsJuniper Networks
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptxMinnySkyy
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationKen Flott
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integrationMarco Essomba
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxcuddietheresa
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaperAlan Rudd
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeterinfra-si
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?Ahmed Banafa
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inmaribethy2y
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthingsPrayukth K V
 

Ähnlich wie Firewall buyers-guide (20)

Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)Wireless Security on Context (disponible en español)
Wireless Security on Context (disponible en español)
 
Improve network safety through better visibility – Netmagic
Improve network safety through better visibility – NetmagicImprove network safety through better visibility – Netmagic
Improve network safety through better visibility – Netmagic
 
“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security“Verify and never trust”: The Zero Trust Model of information security
“Verify and never trust”: The Zero Trust Model of information security
 
Unique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative SolutionsUnique Security Challenges in the Datacenter Demand Innovative Solutions
Unique Security Challenges in the Datacenter Demand Innovative Solutions
 
supply chain management.pptx
supply chain management.pptxsupply chain management.pptx
supply chain management.pptx
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Toward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network AutomationToward Continuous Cybersecurity With Network Automation
Toward Continuous Cybersecurity With Network Automation
 
Clearswift f5 integration
Clearswift f5 integrationClearswift f5 integration
Clearswift f5 integration
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Enterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISEEnterprise Edge Security with Cisco ISE
Enterprise Edge Security with Cisco ISE
 
security_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepapersecurity_secure_pipes_frost_whitepaper
security_secure_pipes_frost_whitepaper
 
Securing the network perimeter
Securing the network perimeterSecuring the network perimeter
Securing the network perimeter
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
What is zero trust model of information security?
What is zero trust model of information security?What is zero trust model of information security?
What is zero trust model of information security?
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
Building security into the internetofthings
Building security into the internetofthingsBuilding security into the internetofthings
Building security into the internetofthings
 
Wfh remote access tips
Wfh   remote access tipsWfh   remote access tips
Wfh remote access tips
 

Kürzlich hochgeladen

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...SUHANI PANDEY
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...SUHANI PANDEY
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge GraphsEleniIlkou
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubaikojalkojal131
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋nirzagarg
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...nilamkumrai
 

Kürzlich hochgeladen (20)

VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Himatnagar 7001035870 Whatsapp Number, 24/07 Booking
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
Sarola * Female Escorts Service in Pune | 8005736733 Independent Escorts & Da...
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
2nd Solid Symposium: Solid Pods vs Personal Knowledge Graphs
 
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
Low Sexy Call Girls In Mohali 9053900678 🥵Have Save And Good Place 🥵
 
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
📱Dehradun Call Girls Service 📱☎️ +91'905,3900,678 ☎️📱 Call Girls In Dehradun 📱
 
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls DubaiDubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
Dubai=Desi Dubai Call Girls O525547819 Outdoor Call Girls Dubai
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Salem Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
💚😋 Bilaspur Escort Service Call Girls, 9352852248 ₹5000 To 25K With AC💚😋
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 

Firewall buyers-guide

  • 1. Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper 1 Next-Generation Firewall Buyer’s Guide The Definitive Guide for Evaluating Enterprise ­ Network Firewalls The rapid evolution of IT has changed the face of the network perimeter. Data and users are everywhere. New devices are joining the network and proliferating more quickly than most organizations can keep up, sometimes without notice. At the same time, IT teams are adopting the cloud, big data analytics, machine learning, and automation to accelerate delivery of new applications to drive business growth. Meanwhile, applications are increasingly accessible. The result is an incredibly complex network that introduces significant business risk. Organizations must minimize this risk without slowing down their business.
  • 2. 2 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper Traditional cybersecurity is falling behind as attacks are con- stantly and automatically morphing. Spending on security feels endless, and the reduction of risk is unclear. Deploying dispa- rate, non-integrated tools and technologies leaves your busi- ness exposed to threats. Security tools that weren’t designed for automation require analysts to manually stitch together in- sights from many disconnected sources before acting. We need a new, disruptive approach. It starts with a next-generation firewall platform as the corner- stone of an effective network security strategy. With a preven- tion-focused architecture, security teams can easily adopt best practicestoproactivelypreventsuccessfulattacks,useautoma- tion and analytics to reduce manual effort, replace disconnect- ed point products, and deploy tightly integrated innovations that strengthen and simplify security. This paper describes the evolution of the firewall to “next-gen- eration,” highlights critical capabilities a next-generation firewall must have to secure your network and your business, and provides key questions you should ask during the re- quest-for-proposal (RFP) process as you formally evaluate your next next-generation firewall. The Evolution of the Next-­ Generation Firewall Early on, stateful inspection firewalls classified traffic by look- ing only at the destination port, such as TCP port 80 for HTTP. As the need for application awareness arose, many vendors added application visibility and other software or hardware “blades” into their stateful inspection firewalls, which they subsequently sold as unified threat management (UTM) of- ferings. However, since their functions were retrofitted—not natively integrated—UTMs did not improve security. Unlike UTM offerings, next-generation firewalls are applica- tion-aware and make decisions based on application, user, and content. The integrated design improves security and simplifies operations. Given the model’s success, the term “next-genera- tion firewall” is now synonymous with “firewall.” Over the last decade, many security vendors have focused on reducing the time it takes to react to new attacks, new devices, and a need for policy changes—from weeks to days, hours, and in some cases, even minutes. However, only shortening reaction times is becoming unproductive given how rapidly attacks, de- vices, and environments are changing. The next evolution of the next-generation firewall will require network security solutions that proactively deliver protection against tomorrow’s threats. Next-generation firewall selection criteria typically fall into three areas: security functions, operations, and performance. The security functions correspond to the efficacy of the security controls and your team’s ability to manage the risk associated with the applications traversing your network, without slowing down the business. From an operations perspective, applica- tion policy should be accessible and simple to manage, apply- ing ­ automation to reduce manual effort so security teams can focus on high-value activities. Performance criteria are simple: the firewall must do what it’s supposed to do at the required throughput for your business needs. As part of this, innova- tions should be tightly integrated and easy to adopt. Although requirements and priorities will vary within these criteria, there are certain capabilities your next firewall must have. 15 Things Your Next-Generation Firewall Must Do 1. Identify Users and Enable Appropriate Access The Problem Employees, customers, and partners connect to different re- positories of information within your network, as well as to the internet. These people and their many devices represent your network’s users. It’s important for your organization’s security posture that you’re able to identify your users be- yond IP address as well as grasp the inherent risks they bring based on the devices they’re using—especially when securi- ty policies have been circumvented or new threats have been introduced to your network. Figure 1: Users access data from different devices and locations 1. Adam Hils, Jeremy D’Hoinne, Rajpreet Kaur, “Magic Quadrant for Enterprise Network Firewalls,” Gartner, July 10, 2017, https://www.gartner.com/en/documents/3757665/­ magic-quadrant-for-enterprise-network-firewalls. Gartner predicted that, by the end of 2019, 90% of ­ enterprise internet connections for the installed base would be secured with next-generation ­firewalls.1 Next-Generation Firewall Requirements • Identify applications regardless of port, protocol, evasive tactics, or encryption. • Identify users regardless of device or IP address. • Decrypt encrypted traffic. • Protect in real time against known and unknown threats embedded in applications. • Deliver predictable, multi-gigabit, inline throughput. Home PC Work laptop BYOD phone User Branch Home On the go HQ Public cloud SaaS Data center Internet
  • 3. 3 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper In addition, users are constantly moving to different physical locations and using multiple devices, operating ­ systems, and application versions to access the data they need. IP address subnets are mapped only to physical locations, not individual users, meaning that if users move around—even within the of- fice—policy doesn’t follow them. Finally, user directories don’t include behavioral characteristics, so a user’s risk profile can changeorcredentialscanbecomecompromised,yettheuserre- tainsthesamelevelofaccesssimplybasedonrole.Sinceuserdi- rectory changes take time, risky or malicious activity can go un- checked and increase the risk to which an enterprise is exposed. Addressing the Problem User and group information must be directly integrated into the technology platforms that secure modern organizations. Your next firewall must be able to pull user identity from multiple sources, including virtual private networks (VPNs), wireless local area network (WLAN) access controllers, direc- tory servers, email servers, and captive portals. Knowing who is using the applications on your network, and who may be transmitting a threat or transferring files, strengthens secu- rity policies and improves incident response times. Your firewall must allow policies to safely enable applications based on users or groups of users, outbound or inbound—for example, by allowing only your IT department to use tools such as SSH, telnet, and FTP. User-based policies follow users no matter where they go—at headquarters, branch offices, or home—and on whatever devices they use. However, develop- ing policies based on user information in the directory is not sufficient. You should be able to dynamically change user ac- cess based on changes in circumstances, whether the change is due to new indicators of compromise (IOCs) or a business need, such as granting temporary access to a set of users. 2. Prevent Theft and Abuse of Corporate ­Credentials The Problem Users and their credentials are among the weakest links in an organization’s security infrastructure. According to the 2019 Data Breach Investigations Report by Verizon, in the 12-month period covered in the report, 29% of hacking-­ related breaches took advantage of stolen and/or weak pass- words.2 With stolen credentials as part of their toolset, attack- ers’ chances of successfully breaching go up, and their risk of getting caught goes down. To prevent credential theft, most organizations rely on employee education, which is prone to human error by nature. Technology products commonly rely on identifying known phishing sites and filtering email. However, these methods can sometimes be bypassed— checking for known bad sites misses newly created ones, and attackers can evade mail filtering technology by sending links through social media. Attackers can easily steal creden- tials through phishing, malware, social engineering, or brute force, and can even buy them on the dark web. Attackers use these credentials to gain access to a network, move ­ laterally, and escalate their privileges for unauthorized access to appli- cations and data. Addressing the Problem Organizations should look for a firewall with machine learn- ing-based analysis to identify websites that steal creden- tials. If the analysis identifies a site as malicious, the fire- wall should be updated and block it. Still, there will always be new, ­ never-before-seen phishing sites that are treated as ­ “unknown.” Your next firewall must allow you to block submission of corporate credentials to unknown sites. The firewall must also allow you to protect sensitive data and ap- plications by enforcing multi-factor authentication (MFA) to prevent attackers from abusing stolen credentials. By in- tegrating with common MFA vendors, your firewall can pro- tect your applications containing sensitive data, including legacy applications. 3. Safely Enable All Apps and Control Functions The Problem More and more applications, such as instant messaging ­ applications, peer-to-peer file sharing, or voice-over-IP, are capable of operating on nonstandard ports or hopping ports. ­Additionally, users are accessing diverse types of apps, ­­ including software-as-a-service (SaaS) apps, from varying ­ devices and locations. Some of these apps are sanctioned, some ­ tolerated, and others unsanctioned, and users are ­ increasingly ­ savvy enough to force applications to run over nonstandard ports through protocols such as RDP and SSH. Further, new applications provide users with rich sets of functions that help ensure user loyalty but may represent different risk profiles. For example, WebEx® is a valuable business tool, but using WebEx desktop sharing to take over an employee’s desktop from an external source may be an internal or regulatory compliance violation. Gmail® and Google Drive are other good ­ examples. Once users sign in to Gmail, which may be allowed by policy, they can easily switch to YouTube® or Google Photos, which may not be al- lowed. Security administrators want complete control over usage of these apps and set policy to allow or control cer- tain types of applications and application functions while denying others. 2. “2019 Data Breach Investigations Report,” Verizon, 2019, https://enterprise.verizon.com/resources/reports/2019-data-breach-investigations-report.pdf. 29% of breaches due to compromised passwords Figure 2: Verizon 2019 DBIR finding on stolen credentials
  • 4. 4 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper Addressing the Problem Your next firewall must classify traffic by application on all ports, all the time, by default—and it should not burden you with researching common ports used by each application. The firewall must provide complete visibility into application usage along with capabilities to understand and control their use (see figure 3). For example, it should understand usage of application functions, such as audio streaming, remote ac- cess, and posting documents, and be able to enforce granu- lar controls over that usage, such as upload versus download permissions, chat versus file transfer, and so on. This must be done continuously. One-and-done traffic classification is not an option as it ignores the fact that these commonly used applications share sessions and support multiple functions. If a different function or feature is introduced in the session, the firewall must perform a policy check again. Continuous state tracking to understand the functions each application may support—and the different associated risks—is a must for your next firewall. 4. Close Dangerous Policy Gaps The Problem Legacy firewalls allow and block traffic based on ports and IP addresses. This approach is inadequate as port-based rules allow both good and bad applications through the firewall. Applications can easily go through a port-based firewall by hopping between ports, using SSL and SSH, or using well- known open ports such as 80 and 443. Over time, customers accumulate thousands of port-based rules on their firewalls, and often migrate these rules as-is to their next-generation firewalls. These rules leave dangerous policy gaps. Custom- ers realize that they must migrate to application-based rules for effective security, but this requires significant manual effort—and due to the cybersecurity skills shortage, most organizations do not have the resources. This becomes a high security risk that may cause a business disruption. In fact, according to Gartner, through 2023, 99% of firewall breaches will be caused by firewall misconfigurations, not firewall flaws.3 Addressing the Problem When evaluating your next firewall, look for one that re- duces the complexity of rule and policy management. This begins with showing you what applications are running on your network, mapping them to the legacy rules, and helping replace the legacy rules. A next-generation firewall should help your security team easily replace legacy rules with in- tuitive, application-based policies. Because rules based on application identification are easy to create, understand, and modify as business needs evolve, they minimize con- figuration errors that leave you vulnerable to data breaches. These policies strengthen security and take significantly less time to manage. Finally, your next firewall should aggregate telemetry information and apply machine learning to auto- matically identify required policy and configuration chang- es. These capabilities can improve security policy optimiza- tion to eliminate breaches due to misconfiguration. 5. Secure Encrypted Traffic The Problem Most enterprise web traffic today is encrypted, and attackers exploit encryption to hide threats from security surveillance. This means even businesses with mature, comprehensive security measures in place can be breached if they are not monitoring encrypted traffic. Additionally, TLS/SSL encryp- tion is used nearly universally, and end users can easily con- figure it to hide non-work-related activity. Addressing the Problem The ability to decrypt TLS/SSL-encrypted traffic is a founda- tional security function. Key elements to look for include rec- ognition and decryption on any port, inbound or outbound; policy control over decryption; and the necessary hardware and software elements to perform decryption across tens of thousands of simultaneous SSL connections without com- promising performance. However, your next firewall must be flexible enough to easily decrypt certain types of encrypt- ed traffic (e.g., HTTPS from unclassified websites) via ­ policy, Figure 3: Control application usage in policy Download File transfer Upload Screen sharing/ remote control Posting Document sharing Audio and video Files sandboxing WildFire .EXE .RAR .XLS .PDF .EXE .RAR .XLS .PDF select select Enterprise vs. consumer accounts File blocking Application 3. Rajpreet Kaur, Adam Hils, John Watts, “Technology Insight for Network Security Policy Management,” Gartner, February 21, 2019, https://www.gartner.com/doc/3902564/technology-insight-network-security-policy.
  • 5. 5 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper while other types (e.g., web traffic from known financial ser- vices organizations) are left alone in compliance with pri- vacy standards. A next-generation firewall should apply se- curity and load balancing to decrypted flows across multiple stacks of security devices for additional enforcement. This eliminates dedicated SSL offloaders, reducing network com- plexity and making decryption simpler to operate. It must also offer support for decryption of modern protocols like TLS 1.3 and HTTP/2 that are gaining widespread adoption. Read Decryption: Why, Where, and How for a detailed over- view of this important capability. 6. Stop Advanced Threats to Prevent ­Successful Cyberattacks­ The Problem Most modern malware—including ransomware variants— uses advanced techniques, such as wrapping malicious pay- loads in legitimate files or packing files to avoid detection, to transport attacks or exploits through network security devices and tools. As organizations have increasingly de- ployed virtual sandboxes for dynamic analysis, attackers have evolved to focus on ways to evade them. They employ techniques that scan for valid user activity, system configu- rations, or indicators of specific virtualization technologies. With the growth of the cybercrime underground, even a nov- ice attacker can purchase plug-and-play threats designed to identify and avoid malware analysis environments. Addressing the Problem Your firewall, using integrated security services, should auto- matically prevent known threats. Unknown threats need to be automatically analyzed and countered, too. Where possible, unknown file- or web-based threats should be blocked inline. In the remaining cases, your organization needs a service that can contextualize behaviors through robust analytics and in- tegration with other parts of your security infrastructure to identify threats at all points within the cyberattack lifecy- cle, not just when threats first enter your network. Blocking known risky file types or access to malicious URLs before they compromise your network reduces your threat exposure. Your firewall should protect you from known vulnerability exploits, malware, and command-and-control (C2) activ- ity without requiring you to manage or maintain multiple ­ single-function appliances. Signatures should be updated au- tomatically and distributed to all enforcement points as soon as new malware is encountered, keeping you protected while allowing your security and incident response teams to focus on the things that matter. A next-generation firewall that utilizes inline machine learning-based prevention and multiple methods of cloud analysis to detect unknown threats, including static analy- sis with machine learning, dynamic analysis, and bare metal analysis, is capable of high-fidelity, evasion-resistant dis- covery. Rather than signatures based on specific attributes, firewalls should use predictive machine learning models resident on the firewall or content-based signatures to de- tect variants, polymorphic malware, or C2 activity. In addi- tion, C2 signatures based on analysis of outbound communi- cation patterns are much more effective protective measures that can scale at machine speed when created automatically. Finally, cloud-delivered security infrastructure is critical for security enforcement. It supports threat detection and pre- vention at massive scale across your network, endpoints, and clouds in addition to allowing you to tap into an open ecosystem of trusted innovators. 7. Stop Attacks That Use DNS The Problem DNS is a massive, often overlooked channel that can be used for malware delivery, C2, and data exfiltration. Adversaries take advantage of the widespread nature of DNS to abuse it at Vulnerability exploit Malware installation Command and control Lateral movement Data exfiltration Figure 5: Disruption at every step to prevent successful attacks 97% of time spent on pages that use HTTPS Time Spent on Encrypted Websites and Apps 96% of pages are loaded on HTTPS Figure 4: Google 2019 findings on encrypted traffic4 4. “Google Transparency Report: HTTPS encryption on the web,” Google, Inc., accessed February 5, 2020, https://transparencyreport.google.com/ https/overview?hl=en.
  • 6. 6 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper 9. Extend Security to Your Evolving Cloud ­Environments The Problem Data and applications reside everywhere—in your network and in the cloud. According to the RightScale 2019 State of the Cloud Report™, 84% of enterprises use multiple public, pri- vate, and/or hybrid clouds—five different clouds on ­ average.5 Compounded with SaaS environments, organizations must now secure sensitive data in the network and a variety of cloud environments. In addition, legacy security tools and techniques designed for static networks weren’t designed to work with cloud native tools or capabilities. Moreover, na- tive security services from the cloud providers themselves, such as Google Cloud Platform (GCP® ), Amazon Web Services (AWS® ) and Microsoft Azure® , typically provide only Layer 4 protections and are specific to that cloud provider. Addressing the Problem To succeed, your organization needs cloud security that ex- tends policy consistently from the network to the cloud, stops malware from accessing and moving laterally (east-west) within the cloud, simplifies management, and minimizes the security policy lag as cloud workloads change. Your next firewall must protect the resident applications and data with the same security posture you may have established on your physical network. To secure multi-cloud deployments, the firewall must support a variety of cloud and virtualization en- vironments, including all major public clouds and virtualized private clouds. The firewall must integrate with native cloud services, such as AWS Lambda and Azure, and automation tools, such as Ansible® and Terraform® , to integrate security into your cloud-first development projects. 10. Use a Zero Trust Strategy The Problem Conventional security models operate on the outdated assump- tion that everything inside an organization’s network can be trusted. These models are designed to protect the perimeter. Meanwhile, threats that get inside the network go unnoticed and are left free to compromise sensitive, valuable business data. In the digital world, trust is nothing but a vulnerability. multiple points of an attack. According to Palo Alto Networks Unit 42 threat research team, almost 80% of malware uses DNS as a way to establish communication with a C2 server. Attack- ers establish reliable command channels that are difficult to take down or identify since DNS is such a reliable way to main- tain a connection to DNS servers. Once a connection is estab- lished, attackers can use DNS traffic to deliver malware into a network or tunnel data out. Additionally, attackers ­ develop domain generation algorithms (DGAs), which automatically create thousands of malicious domains that can be used for C2. As adversaries increasingly automate their attacks, it becomes almost impossible to identify and stop these threats. Addressing the Problem Your organization cannot simply add attacks that use DNS to the block list as this tactic often relies on relatively static threat feeds that work off known bad domains. Without analytics, it is impossible to predict highly dynamic malicious domains. Stopping attacks that use DNS requires a next-generation fire- wall that can apply predictive analytics and machine learning to identify unknown bad domains dynamically. 8. Protect Your Growing Mobile Workforce The Problem The mobile workforce continues to grow along with the use of mobiledevicestoconnecttobusinessapplications,oftenthrough public networks and devices that are open to advanced threats. This increases risk when users are off-premises ­ because there is no network firewall to stop attacks, and the issue becomes even more complex when considering the effects of cloud and bring-your-own-device (BYOD) practices. In addition, remote locations and small branch offices often lack consistent security because it is operationally inefficient and costly to ship firewalls to them or backhaul traffic to headquarters. Addressing the Problem The mobile workforce and remote locations need access to applications from places far beyond your network. They also need protection from targeted cyberattacks, malicious appli- cations and websites, phishing, C2 traffic, and other unknown threats. This requires consistent security. Your next firewall must enable the required levels of visibility, threat preven- tion, and security policy enforcement to protect your distrib- uted users and locations by delivering next-generation fire- wall capabilities from the cloud, securing them without the need to deploy physical hardware. 5. “RightScale 2019 State of the Cloud Report,” Flexera, February 2019, https://resources.flexera.com/web/media/documents/rightscale-2019-state-of-the- cloud-report-from-flexera.pdf. Holistic Coverage for All Operating Systems Given the onslaught of BYOD initiatives and an ­ increasingly mobile workforce, holistic coverage across ­Windows® , macOS® , Android® , and Linux envi- ronments and workloads is critical. Holistic coverage ­ allows organizations to confidently prevent known and unknown malware ­ regardless of which operating systems their users prefer. 84% of enterprises have a multi-cloud strategy Figure 6: RightScale findings on multi-cloud strategy
  • 7. 7 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper incidents. Your reporting capabilities must let your security personnel drill down into network, application, and user be- havior for the context they need to make informed decisions. When these capabilities are delivered from the cloud, your teams can get the networking and security needed in an ar- chitecture designed for everything: traffic, applications, and users, no matter their location. In today’s constantly chang- ing threat landscape, using a single security vendor to ad- dress the vast spectrum of your security and business needs may not be practical. In this case, the ability to integrate with and consume third-party insight and innovation is critical. When evaluating security vendors, be sure to evaluate the flexibility, extensibility, and programmability of what they offer. Read this e-book to learn about a new approach to securing cloud-enabled organizations as well as delivering speed and agility to enterprise networking and security. 12. Automate Routine Tasks and Focus on the Threats That Matter The Problem In a 2018 report, Cybersecurity Ventures estimated that there would be 3.5 million unfilled cybersecurity jobs by 2021.7 This is compounded by a dependency on too many manual processes for day-to-day security operations, such as chasing down data, investigating false positive alerts, and managing remediation. Manually analyzing and cor- relating the vast number of security events slows mitiga- tion, increases the chance for error, and is difficult to scale. Security teams can easily drown in the volume of alerts and miss the critical, actionable ones. The looming short- age of skilled cybersecurity professionals only exacerbates this. Although big data analytics uncovers hidden patterns, correlations, and other insights to provide security teams with actionable intelligence, you still need the right data. That data must be sourced from everywhere—networks, endpoints, SaaS applications, public clouds, private clouds, data centers, and so on—and be ready for analytics. Addressing the Problem When evaluating a next-generation firewall, consider a fire- wall that can act as a segmentation gateway to enable a Zero Trust architecture. Zero Trust is a cybersecurity strategy that eliminates the notion of trust. In a Zero Trust world, there are no trusted devices, systems, or people. You identify the data, assets, applications, and services most critical to the business, determine who or what should have access based on their specific job function, and enforce a least-privileged access model through network segmentation, granular Layer 7 security policy, user access control, and threat prevention. Your next firewall should directly align with Zero Trust, in- cluding enabling secure access for all users irrespective of location, inspecting all traffic, enforcing policies for least-­ privileged access control, and detecting and preventing ad- vanced threats. This significantly reduces the pathways for adversaries, whether they are inside or outside your organi- zation, to access your critical assets. Watch this webinar to get insight into effectively implementing Zero Trust. 11. Maintain Consistent Access Control and ­ Policy Across Clouds and On-Premises, ­ Remote, and Mobile Networks The Problem Organizations have adopted a wide range of point products to address different network and security requirements for appli- cations hosted on-premises, in cloud environments, or both. However, for each product comes a separate policy and inter- face to manage, creating extra costs, complexity, and gaps in security. Additionally, these products are not integrated and cannot share insights into network access, application access, or policy violations, nor can they provide consolidated logs. Organizations also find it challenging to onboard new fire- wall appliances at scale, maintain consistent security policies, and deploy policy changes across thousands of firewalls. This approach causes gaps in security and network performance, leading to staff and cost shortages. Addressing the Problem According to ESG Research, 66% of organizations are active- ly consolidating the number of cybersecurity vendors with which they do business.6 To be successful, firewall solutions must deliver security capabilities in a variety of form fac- tors—hardware, software, and containerized—to integrate security protections into the optimal parts of the environ- ment. You must be able to operationalize the deployment of consistent, centralized security policies across tens of thousands of firewalls spanning on-premises and cloud de- ployments—including remote locations, mobile users, and SaaS applications—through centralized management, con- solidated core security tasks, and streamlined capabilities. For example, you should be able to use a single console to view all network traffic, manage configurations, push global policies, and generate reports on traffic patterns or security 66% of organizations are actively consolidating cybersecurity vendors Figure 7: ESG Research findings on cybersecurity vendor consolidation 6. “The Cybersecurity Technology Consolidation Conundrum, March 26, 2019, https://www.esg-global.com/blog/the-cybersecurity-technology-consolidation-conundrum. 7. “Cybersecurity Jobs Report 2018-2021,” Cybersecurity Ventures, November 28, 2018, https://www.herjavecgroup.com/wp-content/uploads/2018/11/HG-and-CV- Cybersecurity-Jobs-Report-2018.pdf.
  • 8. 8 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper understand one slice of your infrastructure produce sub- optimal results. They limit the application of analytics and force security analysts to bounce between interfaces to try to manually piece together attacks—a process that is both time-consuming and prone to error. Addressing the Problem As the number of needed security functions increases, so does the potential value of platforms/devices that can provide meaningful integration between them. If your firewall can act as a sensor and enforcement point for a more comprehensive, machine-learning driven analytics platform (such as an XDR solution), your security team will gain both efficacy and effi- ciency in uncovering, remediating, and preventing sophisti- cated attacks. Your next firewall should integrate with XDR to allow both your network and security teams to understand the full scope of an attack, share threat context and intelligence, and drive automated response as well as enforcement between the firewall and other enforcement points. 14. Consolidate Connectivity with Security As more enterprises embrace digital transformation and move applications to the cloud, IT teams are challenged to quickly, reliably, and securely connect corporate locations and branch- es to critical business resources. Software-defined wide area networking (SD-WAN) promises to increase bandwidth while improving connectivity and performance, and organiza- tions are taking note. According to Gartner, SD-WAN will be ­ included in 75% of WAN infrastructure refreshes by 2020.8 However, while SD-WAN offers many benefits, it also brings many challenges, such as degraded or bolted-on security, unforeseen architecture and deployment complexity, and unpredictable performance. Addressing the Problem Your next firewall should extend to your branches the same consistent secu­ rity that protects your data center and cloud environments. Organizations can adopt SD-WAN safely by implementing a firewall that natively integrates with it, consolidating their connectivity and security. This can also Addressing the Problem By using precise analytics to drive automation, you can easily operate security best practices like Zero Trust, streamline rou- tine tasks, and focus on business priorities—such as speeding up application delivery, improving processes, or hunting for threats. There are three ways to think about automation: 1. Workflow automation: The firewall must expose standard APIs so it can be programmed from other tools and scripts you may be using. In the cloud, it must integrate with tools like Ansible and Terraform. In addition, the firewall must be able to kick off workflows on other devices in your se- curity ecosystem, using their APIs, without manual in- tervention. This automation should extend to operation- alization of rules and threat information in open source formats, such as Snort or Suricata® . 2. Policy automation: The firewall must be able to adapt pol- icies to any changes in your environment, such as move- ment of applications across virtual machines. It must also be able to ingest threat intelligence from third-party sources and automatically act on that intelligence. 3. Security automation: Your environment must be able to uncover unknown threats and deliver protections to the firewall so new threats are blocked automatically. Some threats remain hidden in data. By looking deeper into that data across locations and deployment types, you can find threats that may be lurking in plain sight. With automation, you can accurately identify threats, enable rapid prevention, improve efficiency, better utilize the talent of your specialized staff, and improve your organization’s security posture. 13. Coordinate Detection and Analytics with Other Security Tools The Problem Advanced adversaries don’t limit themselves to one part of your architecture. Instead, their goal is to move lateral- ly from endpoints to your network, clouds, and other data structures to access and exfiltrate valuable data. With this in mind, siloed security approaches that can only see and 75% of WAN infrastructure refreshes will include SD-WAN by 2020 Figure 9: Gartner findings on SD-WAN adoption Cybersecurity job openings by 2021 3.5M Figure 8: Cybersecurity Ventures findings on cybersecurity jobs
  • 9. 9 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper help maintain consistent security policies from the net- work core out to branches. With SD-WAN configuration and monitoring as well as firewall user and application policy workflows available through a single pane of glass, organi- zations can avoid gaps in their security posture as well as benefit from improved security, simplicity, and efficiency. Read this e-book to learn how to achieve consistent security with SD-WAN. 15. Reduce Exposure IoT Security Risks The Problem According to Unit 42, 30% of devices on enterprise networks today are internet of things (IoT) devices. These devices pose a huge cybersecurity risk as they are often shipped with vulnerabilities and are difficult (or impossible) to patch, yet have unfettered access to an organization’s network. It can be challenging to secure these IoT devices for many reasons. IT is rarely notified of or involved in the purchase and man- agement of IoT devices. Connected devices are incredibly diverse, running a variety of operating systems, firmware versions, and applications. IT teams lack governance over these devices and may have no means to monitor, manage, or track vulnerabilities. Security teams find it hard to define and enforce policies as they don’t know how trusted behav- ior for a device is defined. Because the useful life of devices can exceed a vendor’s supported life, many IoT devices with long lifecycles use legacy operating systems and outdated applications, and thus IT cannot put third-party agents on them to secure them. Addressing the Problem When evaluating your next firewall, consider a solution that can identify and classify all IoT devices on your network, including those never seen before. Your firewall solution should empower security teams to make decisions quick- ly with full context for each device, understanding device identity, risk level, and any behavioral anomalies. The fire- wall should then offer policy recommendations based on risk assessment results that can be automatically enforced natively so that users don’t leave their devices insecure. Read this article to learn how to keep your organization se- cure in the age of IoT. Using the RFP Process to Select a Next-Generation Firewall Recommended RFP Questions and ­Considerations Next-generation firewalls must deliver a wide range of capa- bilities to provide efficient, effective security while also inte- grating with other key prevention, detection, and response tools across the infrastructure. This section translates those requirements into a comprehensive RFP checklist to help you evaluate the quality of the firewall platforms you’re consider- ing. Use this checklist as a starting point, and tailor it to your company’s needs to ensure you’re able to identify vendors that can best protect your organization. Identify Users and Enable Appropriate Access Can your next-generation firewall… • Provide consistent security policy for mobile users? • Protect users who are not behind a next-generation fire- wall? • Use multiple physical/virtual firewalls to support an al- ways-on VPN connection? • Utilize the cloud to bring protection closer to the user? Prevent Credentials Theft and Abuse Can your next-generation firewall… • Prevent use of corporate credentials on unknown websites? • Block users from submitting corporate credentials without storing a copy of the hash in the firewall? • Quickly analyze previously unknown phishing sites and up- date its protections? • Log user attempts to submit credentials in HTTP post? • Support MFA as part of access-control policy based on the sensitivity of the resource accessed? • Provide a variety of choices in MFA partner technologies? • Support API integrations with MFA partner technologies? • Support MFA policy for any type of application, including web, client-server, and terminal applications? • Support MFA capability on any protocol, rather than be limited to certain protocols? Safely Enable All Apps and Control Functions • Can your firewall detect applications that can evade detec- tion using nonstandard ports, port hopping, or by being configured to run on a different port? • In traffic classification, is the first task the firewall executes based on application identity or the network port? • Are the application identification mechanisms part of the core firewall traffic classification (i.e., enabled by default)? • Do the application identification mechanisms depend on the application’s standard port? • Can the signatures be applied to all ports? Is the process automatic or manually configured? • When traffic first hits the device, is it first classified based on port (e.g., port 80, thus assumed to be HTTP) or applica- tion (e.g., Gmail® )? • Describe in detail how the firewall can accurately identify applications: • Which mechanisms, besides signatures, are used to clas- sify traffic? • Whatisthebreadthofapplicationandprotocoldecoderuse? 8. Mike Toussaint, Ted Corbett, Andrew Lerner, “6 Critical Questions to Ask on SD-WAN,” Gartner, June 6, 2018, https://www.gartner.com/en/documents/3877766/6-critical-questions-to-ask-on-sd-wan.
  • 10. 10 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper • How are SSL and SSH decryption and control implemented? • Are the traffic classification mechanisms applied equally across all ports? • Which mechanisms are used to detect purposely evasive applications, such as UltraSurf or encrypted P2P? • Is application identification performed in the firewall, or is it performed in a secondary process, after port-based classification? • Is application state tracked? If so, how is it utilized to en- sure consistent control of the application and associated secondary functions? • Is the identity of the application the basis of the firewall se- curity policy, or is application control treated as a second- ary policy element? • How often is the application database updated? Is it a ­ dynamic update or a system reboot upgrade? Close Dangerous Policy Gaps • Is stateful inspection traffic classification performed sepa- rately, prior to application identification? • Once an application is identified, how are changes in ap- plication state monitored, tracked, and used within policy? • How does the application database hierarchy (flat, multi-­ level, other) expose functions within the parent application for more granular enablement policies? • What levels of control can be exerted over individual applica- tions and their respective functions? • Can port-based controls be implemented for all applications in the application database so an administrator can enforce, by policy, the application and port relationship? For example: • Ensure IT personnel are the only ones allowed to use SSH and RDP? • Detect and block malware within the application, even on a nonstandard port? • Which enterprise identity repositories are supported for ­user-based controls? • Is an API available for custom or nonstandard identity-­ infrastructure integration? • How are policy-based controls implemented by users and groups for terminal services environments? • If any, what are the differences in application enablement ­ options for hardware and virtualized instances? • Does your firewall collect telemetry data for ML-based security policy optimization to eliminate breaches due to misconfiguration? Secure Encrypted Traffic • What is the process by which encrypted applications are ­ identified on all ports, including nonstandard ports? • What policy controls are available to selectively decrypt, ­ inspect, and control applications that are using SSL? • Are bidirectional SSL identification, decryption, and in- spection supported? • Is SSL decryption a standard feature or an extra cost? Is a ­ dedicated device required? • Is SSH control (a means of accessing remote devices) ­ supported? If so, what is the depth of control? • What mechanisms are used to identify evasive applications, such as UltraSurf and Tor? • How does the product automatically identify a circumven- tor that is using a nonstandard port? Stop Advanced Threats to Prevent Successful Cyberattacks • Does your next-generation firewall deliver machine learn- ing-based prevention of unknown malware files and vari- ants, including executables as well as fileless attacks lever- aging scripts such as PowerShell? • Does your next-generation firewall deliver inline machine learning-based prevention of malicious website attacks, including JavaScript or credential phishing attacks? • How quickly does your cloud-based malware analysis sys- tem distribute signatures after verdict generation? • Does your cloud-based malware analysis system support multiple analysis techniques, including bare metal analy- sis, to detect evasive, sandbox-aware malware? • Does your cloud-based malware analysis system use a custom-coded hypervisor to be effective against ­sandbox-aware malware? • Does your malware analysis system, after analyzing mal- ware, create threat prevention signatures, such as: • Content-based AV signatures to prevent known and un- known variants of malware? • Pattern-based anti-spyware signatures to detect com- munications to known and unknown C2 infrastructure? • Does your cloud-based malware analysis system support malware analysis for file types of Windows, Android, and macOS operating systems? • Can your next-generation firewall block executables and other risky file types from unknown applications and URLs to prevent ransomware attacks? • Can your next-generation firewall automatically and dy- namically import all known IOCs (i.e., IPs, domains, and URLs) into the block list to be proactive against known ran- somware families? • Does the threat intelligence cloud integration with the next-generation firewall support dynamic updates for ma- licious URLs related to ransomware in the malware catego- ry of the URL filtering database? • Can your next-generation firewall learn about threats or ransomware behavior from your endpoint protection soft- ware and vice versa? Stop Attacks That Use DNS • Does cloud-based threat intelligence integration with the next-generation firewall support dynamic updates for ma- licious domains related to ransomware as DNS signatures to be automatically added to the block list or sinkholed?
  • 11. 11 Strata by Palo Alto Networks | Next-Generation Firewall Buyer’s Guide | White Paper Maintain Consistent Access Control and Policy Across Clouds as Well as On-Premises, Remote, and Mobile Networks • Does your firewall solution deliver consistent network se- curity and threat prevention aligned to applications hosted on-premisesandinvirtualizedandcontainerenvironments? • Does your firewall solution natively deploy within Kuberne- tes® ­to integrate firewall provisioning into a continuous in- tegration/continuous development (CI/CD) processes? • Does your firewall integrate into software-defined net- working (SDN) solutions to extend security protections to remote locations for branch segmentation and to meet PCI compliance? • Can local administrators work directly on the appliance and change configurations as needed without logging in to a central manager? • Can central administrators monitor and view changes made by local administrators? • Can you choose which firewall administrator’s configuration changes should be deployed on the firewalls? • When deployments go wrong, can you quickly roll back changes from specific users and restore working config- uration? • Can the central firewall manager separate log management from core configuration management yet still act as a ­ single pane of glass for unified visibility? • Can your log managers ingest logs at high throughput (e.g., 50,000 LPS)? • Does your firewall have APIs for every feature so that you can automate configuration changes? Automate Routine Tasks and Focus on the Threats That Matter • Does your security vendor support the capability to auto- matically generate prevention signatures across the attack lifecycle for all data relevant to attacks? • Can your firewall correlate and identify infected hosts in the network and quarantine them to limit their access in the network? • Can your firewall trigger MFA to prevent credential abuse and secure critical applications? • Can your firewall correlate the threats seen in the network with information obtained from global threat intelligence? Coordinate Detection and Analytics with Other Security Tools Can your next-generation firewall or manager… • Create a ticket on a change management system based on a malicious event seen on the firewall? • Trigger a quarantine action for an infected host on the wireless network? Protect Your Growing Mobile Workforce • In detail, what are the available options for securing remote users, including all necessary components? • If a client component is included, how is it distributed? • What are your sizing requirements? How many users can be supported simultaneously? • Is the remote user security feature set transparent to the client? • How is policy control over remote users implemented (in firewall policy, in a separate policy/device, etc.)? • Which features and protections are provided by the remote capabilities (SSL, application control, IPS, etc.)? • Can your firewall keep users connected to ensure consistent policy enforcement regardless of location? • How do you address mobile device users? Will you be able to provide consistent policy enforcement whether users are on external networks or internal wireless networks? • Can the firewall address BYOD issues, such as safely en- abling corporate and personally owned laptops, phones, and tablets? Extend Security to Your Evolving Cloud Environments • How does the next-generation firewall create security pol- icies based on VM attributes of workloads? • Can the next-generation firewall create security policies for dynamic workloads in both private and public clouds? • Can the next-generation firewall ensure consistent security policies for workloads, even when their IP addresses or lo- cations change in the data center? • In virtualized environments, how is traffic classified throughout the virtual machine (east-west, north-south)? • What are the points of integration within the virtualized environment? • What does the process of building security policies for newly created virtual machines look like? • What features are available to track virtual machine moves, adds, and changes? • What features are available for integration with automa- tion and orchestration systems? Use a Zero Trust Strategy • Does your next-generation firewall enable you to write ­ context-based policy to determine who or what can access your protect surface? • How does the next-generation firewall leverage network segmentation, prevent lateral movement, provide Layer 7 threat prevention, and simplify granular user access con- trol? • Does the next-generation firewall inspect all traffic for malicious content and unauthorized activity as well as log through Layer 7, both inside and outside, across the net- work and cloud environments?
  • 12. 3000 Tannery Way Santa Clara, CA 95054 Main: +1.408.753.4000 Sales: +1.866.320.4788 Support: +1.866.898.9087 www.paloaltonetworks.com © 2020 Palo Alto Networks, Inc. Palo Alto Networks is a registered ­ trademark of Palo Alto Networks. A list of our trademarks can be found at https://www.paloaltonetworks.com/company/trademarks.html. All other marks mentioned herein may be trademarks of their respective companies. next-generation-firewall-buyers-guide-wp-061620 • How does the next-generation firewall enforce security policies for cloud services and applications delivered to the branch office? • How does the next-generation firewall improve the securi- ty of cloud applications and services accessed from a branch office? Reduce Exposure to IoT Security Risks • Does your firewall solution provide visibility into all IoT ­ devices in your network, including those never seen before? • How does your firewall solution secure IoT devices against known and unknown attacks? • Does your firewall offer policy recommendations, based on risk assessment results, that can be automatically en- forced? • Can your firewall segment IoT device traffic from the rest of the network to prevent compromised IoT devices from becoming beachheads for attacks? Are you ready to evaluate your next firewall? Take an Ultimate Test Drive. Can your next-generation firewall… • Be completely programmed via API? • Collect User-ID information via APIs from wireless ­ controllers about hosts connecting to wireless networks? • Dynamically incorporate third-party or custom threat in- telligence feeds in the firewall without policy commits? Does your security architecture… • Support threat feed aggregation, consolidation, and dedu- plication of threat feeds before pushing the indicators to your firewall? • Integrate with your next-generation firewall to automate timeout of expired threat indicators to avoid using stale threat intelligence? • Allow you to target threat indicators from recent APT cam- paigns and incorporate threat feeds proactively on your next-generation firewall? • Allow you to enrich cloud-based threat intelligence and IOCs with intelligence based on a confidence rating to reduce the operational overhead from dealing with false positives? Consolidate Connectivity with Security • What functionality does the next-generation firewall sup- port to ensure the security of end-to-end communications? • How does the next-generation firewall ensure the security of direct internet access (DIA)?