Security Experts:

Connect with us

Hi, what are you looking for?


Network Security

10 Must-Have Features for Your Next Generation Firewall Buyers Checklist

The need for extreme network protection may be the driving force behind your decision to invest in a next-generation firewall (NGFW), but your enterprise also has other factors to consider. You want a NGFW that ensures business resiliency, a reasonable total cost of ownership (TCO), continuous uptime, scalability and flexibility to handle change. It must fit your budget and your network’s specific needs.

The need for extreme network protection may be the driving force behind your decision to invest in a next-generation firewall (NGFW), but your enterprise also has other factors to consider. You want a NGFW that ensures business resiliency, a reasonable total cost of ownership (TCO), continuous uptime, scalability and flexibility to handle change. It must fit your budget and your network’s specific needs. Find a NGFW that meets the following criteria below and you will find a NGFW that meets your enterprise demands.

1. Central, Powerful Management

Logging into multiple firewalls and other components to make changes or view activity can burden your scarce resources. Look for a centralized management system that aggregates data across your security defenses and gives your security team the ability to respond quickly. A centralized system should enable you to deploy, view and control all firewall activity through a single pane of glass. Central management should also give you the ability to automate routine tasks, reuse elements and employ shortcuts and drill-downs to produce maximum efficiency with minimal effort.

Data Center With Firewalls

2. User and Application Control

User and application control has become a must-have feature for NGFWs as the internet continues to offer a myriad places to lure employees away from productive activities. Application controls have advanced significantly beyond just visibility of ports and protocols.  With today’s technologies you should have the power to create detailed policies that can be based on characteristics such as user identity, user role and specific aspects of a web application. Also look for more advanced user and application controls such as the ability to expand user groups, domain names and TLS matches, as well as detailed user and application usage information in reports, logs and statistics.

3. High Availability 

Most consider downtime unacceptable on corporate networks even for routine maintenance. One key feature to achieving high availability and resiliency is the use of active-active clustering of your NGFW. Active-active clustering gives you uninterrupted operations during system updates and maintenance, allowing increased flexibility when process-intensive applications require more performance. Clusters should be able to be upgraded node-by-node without service breaks, operating with different software versions or hardware variants during maintenance.  

4. Plug and Play Deployment

If your enterprise encompasses many distributed locations, you need to deploy a NGFW that features plug-and-play capability. Using the cloud for installation and configuration, your NGFW should be easily installed by anyone at the remote location by plugging in power and physical network connectivity. The rest should be handled remotely. The savings in time and travel costs can be significant, often reducing implementations from weeks to minutes. Updates and upgrades to remote sites can be automated and performed just as seamlessly, with the ability to view and manage remote operations through the central management system.

5. Deep Packet Inspection

Deep packet inspection (DPI) is another must for your NGFW. This capability ensures the various pieces of each packet are thoroughly examined to identify malformed packets, errors, known attacks and any other anomalies. DPI can rapidly identify and then block Trojans, viruses, spam, intrusion attempts and any other violations of normal protocol communications. Packet data analysis is typically done through various methods, including data stream-based inspection, vulnerability signatures, policy configurations, protocol identification, data normalization, and both clear-text HTTP and encrypted HTTPS connections. NGFWs equipped with DPI capabilities should also provide dynamic updates that can be automated, regularly updating recommended policy configurations and vulnerability-based protection fingerprints.

Firewall Checklist

6. AET Protection

Advanced evasion techniques (AET) are notorious for their ability to combine attacks, change dynamically during attacks and use several protocol layers, all with the intent of delivering malicious content or an exploit through a traffic stream that appears normal to less advanced security solutions. AET protection technologies remove obfuscations so traffic can be thoroughly inspected across multiple protocols and layers, providing full-stack, multi-layer traffic normalization that deconstructs and decodes packets. When AET protection is built right into the core of the NGFW, even the most thorough data analysis and normalization does not impact network performance.

7. Multi-Tenancy

Large enterprises and managed service providers have an essential need for a NGFW with multi-tenancy capabilities. This feature ensures distinction between domains to properly secure end users without sacrificing efficiency. Multi-tenancy capabilities provide separate but inter-operable domain management abilities which can also apply to separate business units, geographical locations or external customer organizations. While multi-tenancy allows entities to remain separate, all enjoy the same situational awareness, administrative tools, automated functionality, constantly optimized connections and other features available through your NGFW.

8. Adaptable, Convertible Architecture

The architecture of your next NGFW needs to be adaptable and convertible so you can most effectively deploy security as you need it. Look for a NGFW that is available as software or as a physical or virtual appliance for the highest range of budgetary and architectural flexibility. Insist on a solution that can also change its roles as needed, serving as a next generation firewall intrusion prevention system (IPS), Layer 2 firewall or firewall/VPN without the need for new licensing.

9. Enterprise level VPN

For resilient and flexible site-to-site connectivity, powerful virtual private network (VPN) technologies must be part of your NGFW. Many NGFWs feature IPsec VPN, which consists of a set of security protocols inserted at the packet processing layer of communication. IPsec comes with several advantages, one of which is the ability to handle security arrangements without the need to implement changes on individual computers. Look for NGFWs that can add even more power to your VPN by combining IPsec VPN with other advanced technologies, such as those that may combine links or tunnels to produce a cost-effective and highly available VPN connection.  Make sure your NGFW has sufficiently powerful management tools to deploy, configure and operate your VPNs.

10. Virtualization

With virtual appliances, you can easily and independently deploy a comprehensive security infrastructure using virtual machines. Each virtual appliance can serve an independent role, and even run its own software version and operating system. Virtual contexts offer a way to logically divide security gateway configurations into separately manageable instances on a single physical NGFW appliance. This approach is ideal for managed security service providers (MSSPs), who offer and manage security services for multiple customers using the same physical elements.

Written By

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Network Security

Cisco patched a high-severity SQL injection vulnerability in Unified Communications Manager (CM) and Unified Communications Manager Session Management Edition (CM SME).

Cybersecurity Funding

Network security provider Corsa Security last week announced that it has raised $10 million from Roadmap Capital. To date, the company has raised $50...

Network Security

Vulnerabilities identified in TP-Link and NetComm router models could be exploited to achieve remote code execution (RCE).