Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

If Opportunity Makes a Thief, What Stops One?

Questions Security Professionals Should Ask When Evaluating Next-Generation Firewalls

Questions Security Professionals Should Ask When Evaluating Next-Generation Firewalls

Statesman and philosopher Francis Bacon said, “Opportunity makes a thief.” And never has there been more opportunity for cybercriminals to take what’s not theirs than in today’s digital economy. Yes, digitization and the Internet of Everything is transforming our world and creating new opportunities for businesses and consumers. But these new business models are also creating more opportunities for attackers as modern networks and their components constantly evolve and spawn new attack vectors.

While adversaries are executing more advanced and damaging attacks, defenders are responding in the classic way with new point solutions. The problem with this piecemeal approach to security is that stopgap solutions create additional gaps in protection that attackers are using to their advantage. For security teams that are resource-constrained, managing all these tools is also becoming unwieldy.

As cyber attacks become more sophisticated, businesses need an equally sophisticated and intelligent way of protecting against malicious intrusions. Unfortunately, many Next-Generation Firewalls (NGFWs) focus on enabling applications and users and are not sufficiently protecting against threats. Many use traditional intrusion prevention systems that lack the ability to detect emerging attacks or evasive malware that can hide in plain sight. And most NGFWs today can’t help once an infection does occur.

So how do you make sure you’re selecting an NGFW that reduces opportunities for thieves across the full attack continuum – before, during, and after an attack?

Questions to Ask Network Security Vendors

When evaluating an NGFW you need to ask the following questions:

1. How can it help me protect against today’s advanced attacks?

You need actionable, multi-layered threat protection. A threat-focused NGFW should include best-in-class security technologies that work together across the network and endpoints and are managed through a central console. These technologies, such as next-generation intrusion prevention, advanced malware protection, application visibility and control, and URL filtering, should be integrated to continuously correlate threat intelligence across security layers so you can identify and protect against sophisticated attacks early on.

Advertisement. Scroll to continue reading.

2. Can it help me see what’s happening on my network at all times?

You can’t protect what you can’t see. To increase security effectiveness you need a holistic view and full contextual awareness across your environment, including visibility into users, operating systems, devices, communications between virtual machines, threats and vulnerabilities, applications and website access, and file transfers. This level of insight allows you to discover new devices on your network, identify and address security gaps, and fine-tune policies to reduce the number of significant events requiring additional action.

3. When malware gets into the network can it help me accelerate detection and mitigate risk?

The current industry standard time to detect a threat is between 100 to 200 days; that’s far too long. An NGFW should provide actionable indicators of compromise (IoCs) that correlate network and endpoint security intelligence. This will provide highly accurate visibility into suspect and malicious file and host behavior. This early warning helps organizations protect from emerging or unknown attacks, allowing quick action to avoid losses. When attacks are successful, retrospective security scopes the full extent of the problem so you can quickly determine root cause and take action. Even files that were once unknown, or thought to be inert, can later be identified as malicious and quarantined to stop their spread and avoid further damage.

4. With my limited resources, can it help me save costs and reduce complexity?

Integration and automation are essential. An NGFW that consolidates multiple layers of defenses on a single platform and automates routine security tasks like impact assessment, policy tuning, and user identification will free up your team to focus on events that matter most. Automation can also help you react quickly to attacks and take action.

5. Can I take advantage of my existing security investments that are providing valuable data?

You need to be able to share intelligence and better leverage existing security technologies to consolidate and streamline response. Look for an NGFW that is open and integrates smoothly with an ecosystem of third-party security solutions like vulnerability management systems, network visualization and SIEM systems, workflow remediation and ticketing systems, and network access control (NAC). Not only does third-party solution integration reduce your IT burden and total cost of ownership (TCO), but it also strengthens multi-layered protection.

It’s true that opportunity makes a thief. But with an NGFW that offers tightly-integrated, multi-layered threat protection you also have more opportunities to stop a thief – before, during, and after an attack.

Written By

Marc Solomon is Chief Marketing Officer at ThreatQuotient. He has a strong track record driving growth and building teams for fast growing security companies, resulting in several successful liquidity events. Prior to ThreatQuotient he served as VP of Security Marketing for Cisco following its $2.7 billion acquisition of Sourcefire. While at Sourcefire, Marc served as CMO and SVP of Products. He has also held leadership positions at Fiberlink MaaS360 (acquired by IBM), McAfee (acquired by Intel), Everdream (acquired by Dell), Deloitte Consulting and HP. Marc also serves as an Advisor to a number of technology companies.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Attack surface management is nothing short of a complete methodology for providing effective cybersecurity. It doesn’t seek to protect everything, but concentrates on areas...

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Network Security

A zero-day vulnerability named HTTP/2 Rapid Reset has been exploited to launch some of the largest DDoS attacks in history.

Cyberwarfare

Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet