SASE converges the functions of network and security point solutions into a unified, global cloud-native service. Gartner has highlighted FWaaS as an emerging infrastructure protection technology with a high impact benefit rating.įWAS i s an integral component of a Secure Access Service Edge (SASE) networking platform. A single, logical global firewall with a unified application-aware security policy connects the entire enterprise - all sites, remote users, and cloud resources. Firewall-as-a-Service ( FWaaS ) truly eliminates the appliance form factor, making a full stack of network security (URL Filtering, IPS, AM, NG-AM, Analytics, MDR) available everywhere. T here is a new and revolutionary way of delivering N GFW and other network security capabilities as a cloud service. The Future of Enterprise Security is in the Cloud With more users accessing resources in the cloud, first sending traffic back to a private datacenter for security inspection by the NGFW makes little sense and c an damage the usability of SaaS applications. The same can be said on the application side. Users operate anywhere and everywhere but they still must send all of their traffic back to these appliances for inspection, which is inefficient. What’s more, placing NGFWs and UTMs in the headquarters or branch doesn’t reflect the needs of today’s business. Failing to do that leads to a trade-off between implementing the necessary security functions and reducing processing load to improve performance. Ultimately, t his forces an appliance upgrade with all of the additional costs and complexity involved. As enterprises enable more security functions and as traffic levels grow, the appliance s require more processing power. The concept of UTM is good -the execution, not so much. This new all-in-one security device is what became known as the UTM. These functions could all be separate appliances, or they could all be brought together into a single converged appliance. They also want malware inspection, intrusion detection and prevention, content filtering, and other security measures. While firewalls are essential, companies need more than just a firewall in their security quiver. UTM s Converg e Security into One Appliance This led to the development of next generation firewalls ( NGFWs ) that look into the application layer to determin e whether or not a flow is malicious. But as applications and networking evolved, firewalls needed to look beyond port 80 to make a determination whether or not a packet flow was malicious.Īs the industry started to adopt applications and services that shared common TCP ports, simply looking at the source o r destination address and the TCP information wasn’t sufficient to detect malicious traffic. Traditionally, port 80 of the firewall bore extra scrutiny because this is where web traffic came in. All traffic passed through the firewall for basic inspection of security policies based on network information such as the type of protocol or the source/destination addresses. It was a physical appliance installed at a location such as a datacenter or a branch office. Firewalls Evolve Over the Yearsīefore the UTM, there was the basic firewall. How can you t ake the UTM ’s benefits and avoid the scalability problem? Let’s take a look to find out what ’s beyond the UTM and the future of network security. In reality, though, UTMs often became headaches in the making, putting IT on a vicious and costly life cycle of appliance upgrades. In theory, Universal Threat Management (UTM) platforms should have long ago promote d efficiency : collapsing many security features into a single appliance.
0 Comments
Leave a Reply. |