Vendor Landscape: Next Generation Firewall
Continued consolidation of capabilities means high performing products.
Send a friend or colleague a link to this article
Last Revised: July 22, 2014
View Vendor Shortlist
What is a shortlist?
A shortlist is a personalized list of vendors based on the criteria you define. Your shortlist offers more information about vendor's strengths, weaknesses, price-points, etc, and ranks them according to your needs.
What is a Value Score?
The Value Score indexes each vendor’s product offering and business strength relative to their price point. It does not indicate vendor ranking.
Vendors that score high offer more bang for the buck (e.g. features, usability, stability, etc.) than the average vendor, while the inverse is true for those that score lower.
Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.
- Every enterprise needs to implement the right security solutions to protect its operations and its data; “Firewalls” are a table-stakes requirement for an enterprise to be secure.
- Next Generation Firewalls (NGFW) have replaced Unified Threat Management (UTM) systems as feature portfolios broaden.
- Picking the right solution means appropriate protection at an acceptable cost; picking wrong could mean higher cost, lower security, or both.
- The only traffic that counts anymore is HTTP/S: as all traffic becomes Web traffic, controlling traffic flow by protocol becomes keyed to digging into Port 80 (and 443) traffic.
- Inbound is no longer the only direction that threats flow: as security focus has shifted from infrastructure to data, protection needs to address outbound flow as much as inbound attacks.
- Firewalls can’t protect traffic they can’t see: encrypted traffic obfuscates threats from Firewalls while Wi-Fi networks allow attacks to bypass them entirely; modern solutions must control these traffic types as well.
Impact and Result
- Enterprises that plan carefully and select thoughtfully can improve enterprise security while reducing cost and trimming administrative effort with a capable UTM/NGFW; the broader capabilities these tools offer means organizations can get rid of older point solutions that supported the incumbent firewall.
Get the Complete Storyboard
See how all the steps you need to take come together, with tools and advice to help with each task on your list.Download Now
Get to Action
Best Practices Toolkit
Understand the NGFW market space
Understand NGFW solutions, their capabilities, and cost.
Review NGFW solutions
Build a shortlist of best-fit NGFW tools for the enterprise.
Issue an RFP to the shortlist of vendors
Solicit responses from shortlisted vendors to find optimal enterprise fit.
Review RFP winners
Ensure that selected proponents can deliver when it counts.
This guided implementation is a three call advisory process.
Call #1: Shortlist assistance and requirements
Get off to a productive start: Discuss the market space and how vendors are evaluated. Decide on which deployment option suits you best and narrow down the options based on customized requirements.
Call #2: RFP and budget review
Interpret and act on RFP results: Review vendors RFPs and ensure the solution is meeting your needs. Discuss average pricing of solutions and what can fit into your budget.
Call #3: Negotiation and contract review
Purchase optimization: Review contracts and discuss best practices in negotiation tactics to get the best price for your solution.
Secure the Network Against Remote & Rogue Endpoints in Four Steps
Select and Implement Intrusion Detection and Prevention Systems
Secure Critical Systems and Intellectual Property Against APT
Develop a Network Security Roadmap to Lower Incident Costs and Increase Efficiency
Select and Implement an Email Security Gateway
Secure the Network in a BYOD World
Vendor Landscape: Email Security Gateway
Vendor Landscape: Intrusion Detection and Prevention Systems
Vendor Landscape: Security Information & Event Management
Vendor Landscape: Network Access Control
Vendor Landscape: Endpoint Protection
Vendor Landscape: Next Generation Firewall
Develop an Up-to-Date Active Directory Strategy, and Implement
Cut Through Confusion to Understand and Secure Your Cloud Today