What is a Next-Generation Firewall?

Before, basic firewalling was situated in the 4th layer of the OSI model. In short, this meant the firewall was able to block or allow traffic based on the source or destination. For example, person X can browse the web, while person Y can’t or only person X can make and RDP connection to an external server.

These days there is more to the web than just web pages and browsers navigating them. We are having more and more different devices accessing the web, but also devices trying to access our network. To be able to provide secure access from and to our network, we need a firewall that understands more than just source, destination, and ports. This is where the Next Generation Firewall (NGFW) comes in, a device that is able to ‘see’ traffic up to layer 7 of the OSI model.

Wi-Fi Networks by EASI

What can a NGFW do for your network security?

Scan encrypted HTTPS traffic

Detect viruses that may be hidden in normal HTTP/HTTPS traffic (and would be allowed by a traditional firewall)

Allow or disallow certain traffic

Categorize the web traffic to decide if it is allowed (block/allow social media, ect... )

Blocking of types of content

Block certain content on a site without blocking the site itself (advertising, plugins, etc...)

Protection against malicious manipulations

Detect manipulations to your internal servers (SQL injection, Adobe Flash vulnerabilities, etc...)

We are already helping them

Vermeiren
Maison Marie-Immaculee
Gemeentebestuur Sint-Jans-Molenbeek
Doyen Auto
Friends of Europe
Monument Vandekerckhove
TCM

Want more information or a quote? Contact us!

Recent articles

Recovery-1
Security
Dirk Slechten
Dirk Slechten
07/08/2019
We've talked about Perimeter Strategy, your End Point & Server Protection Strategy and now it is time for the third and final part of this series: your Backup and Recovery Strategy.
Recovery-1
Security
Dirk Slechten
Dirk Slechten
30/07/2019
Protecting physical desktops & laptops are a challenge in a daily administrator tasks. Physical desktops & laptops have the of being de-centralized. Centralizing your end-points in a data center will give you several security benefits.
Recovery-1
Security
Dirk Slechten
Dirk Slechten
24/07/2019
Only with a good IT strategy with a proactive security strategy and a proactive disaster recovery plan you can increase your chances of withstanding a ransomware attack. Discover how.