Vendor Landscape: Next Generation Firewall
Continued consolidation of capabilities means high performing products.
Send a friend or colleague a link to this article
RETIRED CONTENTPlease note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.
View Vendor Shortlist
What is a shortlist?
A shortlist is a personalized list of vendors based on the criteria you define. Your shortlist offers more information about vendor's strengths, weaknesses, price-points, etc, and ranks them according to your needs.
What is a Value Score?
The Value Score indexes each vendor’s product offering and business strength relative to their price point. It does not indicate vendor ranking.
Vendors that score high offer more bang for the buck (e.g. features, usability, stability, etc.) than the average vendor, while the inverse is true for those that score lower.
Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.
- Every enterprise needs to implement the right security solutions to protect its operations and its data; “Firewalls” are a table-stakes requirement for an enterprise to be secure.
- Next Generation Firewalls (NGFW) have replaced Unified Threat Management (UTM) systems as feature portfolios broaden.
- Picking the right solution means appropriate protection at an acceptable cost; picking wrong could mean higher cost, lower security, or both.
- The only traffic that counts anymore is HTTP/S: as all traffic becomes Web traffic, controlling traffic flow by protocol becomes keyed to digging into Port 80 (and 443) traffic.
- Inbound is no longer the only direction that threats flow: as security focus has shifted from infrastructure to data, protection needs to address outbound flow as much as inbound attacks.
- Firewalls can’t protect traffic they can’t see: encrypted traffic obfuscates threats from Firewalls while Wi-Fi networks allow attacks to bypass them entirely; modern solutions must control these traffic types as well.
Impact and Result
- Enterprises that plan carefully and select thoughtfully can improve enterprise security while reducing cost and trimming administrative effort with a capable UTM/NGFW; the broader capabilities these tools offer means organizations can get rid of older point solutions that supported the incumbent firewall.
Get the Complete Storyboard
See how all the steps you need to take come together, with tools and advice to help with each task on your list.Download Now
Get to Action
Understand the NGFW market space
Understand NGFW solutions, their capabilities, and cost.
Review NGFW solutions
Build a shortlist of best-fit NGFW tools for the enterprise.
Issue an RFP to the shortlist of vendors
Solicit responses from shortlisted vendors to find optimal enterprise fit.
Review RFP winners
Ensure that selected proponents can deliver when it counts.
Secure the Network Against Remote & Rogue Endpoints in Four Steps
Select and Implement an Intrusion Detection and Prevention System
Secure Critical Systems and Intellectual Property Against APT
Build an Information Security Strategy
Develop a Network Security Roadmap to Lower Incident Costs and Increase Efficiency
Select and Implement a Next Generation Firewall
Select and Implement a SIEM Solution
Select and Implement an Email Security Gateway
Ensure Cloud Security in a SaaS Environment
Secure the Network in a BYOD World
Develop a User Management Strategy
Vendor Landscape: Email Security Gateway
Vendor Landscape: Secure Web Gateways
Vendor Landscape: Network Access Control
Vendor Landscape: Endpoint Protection
Combine Information Security Risk Management Components into One Program