What is a Next-Generation Firewall?

Before, basic firewalling was situated in the 4th layer of the OSI model. In short, this meant the firewall was able to block or allow traffic based on the source or destination. For example, person X can browse the web, while person Y can’t or only person X can make and RDP connection to an external server.

These days there is more to the web than just web pages and browsers navigating them. We are having more and more different devices accessing the web, but also devices trying to access our network. To be able to provide secure access from and to our network, we need a firewall that understands more than just source, destination, and ports. This is where the Next Generation Firewall (NGFW) comes in, a device that is able to ‘see’ traffic up to layer 7 of the OSI model.

Wi-Fi Networks by EASI

What can a NGFW do for your network security?

Scan encrypted HTTPS traffic

Detect viruses that may be hidden in normal HTTP/HTTPS traffic (and would be allowed by a traditional firewall)

Allow or disallow certain traffic

Categorize the web traffic to decide if it is allowed (block/allow social media, ect... )

Blocking of types of content

Block certain content on a site without blocking the site itself (advertising, plugins, etc...)

Protection against malicious manipulations

Detect manipulations to your internal servers (SQL injection, Adobe Flash vulnerabilities, etc...)

We are already helping them

Monument Vandekerckhove
Friends of Europe
Doyen Auto
Gemeentebestuur Sint-Jans-Molenbeek
Maison Marie-Immaculee

Want more information or a quote? Contact us!

Recent articles

Maxime Lamarche
Maxime Lamarche
How does it work? Which score will you get? We'll explain it here!
Dirk Slechten
Dirk Slechten
We've talked about Perimeter Strategy, your End Point & Server Protection Strategy and now it is time for the third and final part of this series: your Backup and Recovery Strategy.
Dirk Slechten
Dirk Slechten
Protecting physical desktops & laptops are a challenge in a daily administrator tasks. Physical desktops & laptops have the of being de-centralized. Centralizing your end-points in a data center will give you several security benefits.