RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
- Every enterprise needs to implement the right security solutions to protect its operations and its data; “Firewalls” are a table-stakes requirement for an enterprise to be secure.
- Next Generation Firewalls (NGFW) have replaced Unified Threat Management (UTM) systems as feature portfolios broaden.
- Picking the right solution means appropriate protection at an acceptable cost; picking wrong could mean higher cost, lower security, or both.
- The only traffic that counts anymore is HTTP/S: as all traffic becomes Web traffic, controlling traffic flow by protocol becomes keyed to digging into Port 80 (and 443) traffic.
- Inbound is no longer the only direction that threats flow: as security focus has shifted from infrastructure to data, protection needs to address outbound flow as much as inbound attacks.
- Firewalls can’t protect traffic they can’t see: encrypted traffic obfuscates threats from Firewalls while Wi-Fi networks allow attacks to bypass them entirely; modern solutions must control these traffic types as well.
Impact and Result
- Enterprises that plan carefully and select thoughtfully can improve enterprise security while reducing cost and trimming administrative effort with a capable UTM/NGFW; the broader capabilities these tools offer means organizations can get rid of older point solutions that supported the incumbent firewall.
1. Understand the NGFW market space
Understand NGFW solutions, their capabilities, and cost.
2. Review NGFW solutions
Build a shortlist of best-fit NGFW tools for the enterprise.
3. Issue an RFP to the shortlist of vendors
Solicit responses from shortlisted vendors to find optimal enterprise fit.
4. Review RFP winners
Ensure that selected proponents can deliver when it counts.
This guided implementation is a three call advisory process.
Call #1 - Shortlist assistance and requirements
Get off to a productive start: Discuss the market space and how vendors are evaluated. Decide on which deployment option suits you best and narrow down the options based on customized requirements.
Call #2 - RFP and budget review
Interpret and act on RFP results: Review vendors RFPs and ensure the solution is meeting your needs. Discuss average pricing of solutions and what can fit into your budget.
Call #3 - Negotiation and contract review
Purchase optimization: Review contracts and discuss best practices in negotiation tactics to get the best price for your solution.