Vendor Landscape: Next Generation Firewall

Continued consolidation of capabilities means high performing products.


Please note that the content on this page is retired. This content is not maintained and may contain information or links that are out of date.


You are currently over the vendor limit, please adjust your weightings to equal exactly 100%.


You are currently over the product limit, please adjust your weightings to equal exactly 100%.

What matters more, the vendor score or the product score? As you weigh the importance, we will generate the vendor shortlist to match your needs.

View Vendor Shortlist

What is a shortlist?

A shortlist is a personalized list of vendors based on the criteria you define. Your shortlist offers more information about vendor's strengths, weaknesses, price-points, etc, and ranks them according to your needs.

Access this Vendor Shortlist by logging in with your Info-Tech Research Group membership or unlocking this content.


What is a Value Score?

The Value Score indexes each vendor’s product offering and business strength relative to their price point. It does not indicate vendor ranking.

Vendors that score high offer more bang for the buck (e.g. features, usability, stability, etc.) than the average vendor, while the inverse is true for those that score lower.

Price-conscious enterprises may wish to give the Value Score more consideration than those who are more focused on specific vendor/product attributes.

Your Challenge

  • Every enterprise needs to implement the right security solutions to protect its operations and its data; “Firewalls” are a table-stakes requirement for an enterprise to be secure.
  • Next Generation Firewalls (NGFW) have replaced Unified Threat Management (UTM) systems as feature portfolios broaden.
  • Picking the right solution means appropriate protection at an acceptable cost; picking wrong could mean higher cost, lower security, or both.

Our Advice

Critical Insight

  • The only traffic that counts anymore is HTTP/S: as all traffic becomes Web traffic, controlling traffic flow by protocol becomes keyed to digging into Port 80 (and 443) traffic.
  • Inbound is no longer the only direction that threats flow: as security focus has shifted from infrastructure to data, protection needs to address outbound flow as much as inbound attacks.
  • Firewalls can’t protect traffic they can’t see: encrypted traffic obfuscates threats from Firewalls while Wi-Fi networks allow attacks to bypass them entirely; modern solutions must control these traffic types as well.

Impact and Result

  • Enterprises that plan carefully and select thoughtfully can improve enterprise security while reducing cost and trimming administrative effort with a capable UTM/NGFW; the broader capabilities these tools offer means organizations can get rid of older point solutions that supported the incumbent firewall.

Get the Complete Storyboard

See how all the steps you need to take come together, with tools and advice to help with each task on your list.

Download Now

Get to Action

  1. Understand the NGFW market space

    Understand NGFW solutions, their capabilities, and cost.

  2. Review NGFW solutions

    Build a shortlist of best-fit NGFW tools for the enterprise.

  3. Issue an RFP to the shortlist of vendors

    Solicit responses from shortlisted vendors to find optimal enterprise fit.

  4. Review RFP winners

    Ensure that selected proponents can deliver when it counts.

Guided implementation icon Guided Implementation

This guided implementation is a three call advisory process.

  • Call #1: Shortlist assistance and requirements

    Get off to a productive start: Discuss the market space and how vendors are evaluated. Decide on which deployment option suits you best and narrow down the options based on customized requirements.

  • Call #2: RFP and budget review

    Interpret and act on RFP results: Review vendors RFPs and ensure the solution is meeting your needs. Discuss average pricing of solutions and what can fit into your budget.

  • Call #3: Negotiation and contract review

    Purchase optimization: Review contracts and discuss best practices in negotiation tactics to get the best price for your solution.


  • Missing comment
    Keith Levine | 01-29-2014

    As fast as this space is developing and with all the security breaches in the retail space I would like to see this updated.

    • Missing comment
      Info-Tech Research Group | 01-30-2014

      Thank you for your comment, this vendor landscape will be refreshed and published by July 2014.

  • Missing comment
    Eric Bigras | 01-21-2015

    There is no date on when this was evaluated or the documents created. Is this info still up to date?

    • 432c05244a845caaca3b276adb15a11e comment
      Info-Tech Research Group | 01-22-2015

      The publication details on the website have been hidden under the “More Details” link at the bottom of each publication beside the comment box.
      This vendor landscape was last refreshed in July 2014 and is current.

  • Missing comment
    George Price | 03-10-2015

    McAfee/Intel procured Stonesoft, a Finnish company focusing on Next Gen firewalls in late 2013. I do not believe that the analysis provided takes this into account. Perhaps a 2015 update can be issued.

    • 432c05244a845caaca3b276adb15a11e comment
      Info-Tech Research Group | 03-12-2015

      Thank you for bringing this to our attention.
      The refresh and update of this Vendor Landscape is currently scheduled to occur summer 2015.

GET HELP Contact Us
VL Methodology