{"id":191384,"date":"2017-05-06T03:31:17","date_gmt":"2017-05-06T07:31:17","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/are-next-generation-firewalls-legacy-technology-network-world\/"},"modified":"2017-05-06T03:31:17","modified_gmt":"2017-05-06T07:31:17","slug":"are-next-generation-firewalls-legacy-technology-network-world","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/technology\/are-next-generation-firewalls-legacy-technology-network-world\/","title":{"rendered":"Are next-generation firewalls legacy technology? &#8211; Network World"},"content":{"rendered":"<p><p>          By Jon Oltsik, Network World | May 5,          2017 12:13 PM PT        <\/p>\n<p>        Jon Oltsik is a principal analyst at Enterprise Strategy        Group ESG and has been quoted in the Wall Street Journal,        Business Week, and the New York Times.      <\/p>\n<p>          Your message has been sent.        <\/p>\n<p>          There was an error emailing this page.        <\/p>\n<p>      A few years ago, next-generation firewalls (NGFWs) came out      of nowhere to become a network security staple. These devices      combined traditional L3\/L4 packet filtering with deep packet      inspection, IPS, and other network security services along      with knowledge about users and applications. This broad      functionality packaging changed the network security      paradigmeveryone needed, or at least wanted a NGFW at the      perimeter or within the internal network.    <\/p>\n<p>      Fast forward to 2017, and the bloom is coming off the NGFW      rose for several reasons:    <\/p>\n<p>      Some of the issues and use cases cited here are fairly      limited to advanced organizations (which represent somewhere      between 15 and 20 percent of the overall enterprise market),      so there is still a massive opportunity for NGFW players with      mid-market organizations and most enterprises who lack the      maturity and experience of more advanced cybersecurity firms.      Nevertheless, these trends will persist, squeezing the NGFW      market overtime.    <\/p>\n<p>      Im not suggesting that NGFW vendors such as Check Point,      Cisco, Forcepoint, Fortinet or Palo Alto Networks are in any      imminent danger. As I mentioned, the market is in an early      stage of transition, so bountiful opportunities remain. Over      time, however, these organizations must alter their portfolio      to offer software- and cloud-based network security      alternatives to traditional firewall hardware.    <\/p>\n<p>      Many are already doing so today. Cisco, Check Point and      Fortinet have introduced network security architectures where      services can live anywhere on the networksort of a      modern-day network operating system (NOS) for network      security. And, of course, a network security architecture      should plug seamlessly into a security operations and      analytics platform architecture (SOAPA).    <\/p>\n<p>      The services that make up NGFWs are still necessary, and      central management and operations is always worthwhile, but      the thought of forcing all these things into some      perimeter-based god box is looking more and more like a      legacy solution. As Bob Dylan might say, \"The times, they are      a changin.\"    <\/p>\n<p>        Jon Oltsik is an ESG senior principal analyst and the        founder of the firms cybersecurity service.      <\/p>\n<p>    Sponsored Links  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See more here:<\/p>\n<p><a target=\"_blank\" rel=\"nofollow\" href=\"http:\/\/www.networkworld.com\/article\/3194950\/security\/are-next-generation-firewalls-legacy-technology.html\" title=\"Are next-generation firewalls legacy technology? - Network World\">Are next-generation firewalls legacy technology? - Network World<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> By Jon Oltsik, Network World | May 5, 2017 12:13 PM PT Jon Oltsik is a principal analyst at Enterprise Strategy Group ESG and has been quoted in the Wall Street Journal, Business Week, and the New York Times.  <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/technology\/are-next-generation-firewalls-legacy-technology-network-world\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[187726],"tags":[],"class_list":["post-191384","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/191384"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=191384"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/191384\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=191384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=191384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=191384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}