- News & Resources: Listings >
- Blog
- How to Improve Safety and Security in Schools – Cloud Manage Network
- Top 10 Cybersecurity Threats in 2024
- Microsegmentation: Protecting Data from Cyber Threats
- Retail shoplifting and loss prevention: How to protect your business
- Generative AI Cost Optimization Strategies
- Why Do I Need to Protect My Cloud?
- 10 Reasons for Engaging Outside Experts to Manage Your Cybersecurity
- Why Hiring a 3rd Party MSP Expert Makes Sense and – and Cents (MANY cents!)
- Brand and Network Considerations When Adopting AI Corporately
- Integrating XDR, SIEM, and SOAR
- 3-2-1 –Go? Not so quick, this time.
- 5 Things a CISO Shoud Know
- 10-Step Patch Management Checklist
- Penetration Testing vs. Breach Attack Simulation
- Current big cyber breaches and impact on businesses
- Smart Infrastructure Gets Lit Up!
- Securing Industrial IoT: The Missing Puzzle Piece
- 7 Common Cybersecurity Mistakes Made by SMBs
- The Future of Physical Security: Cloud-Based Systems
- Autonomous and Sensor Technology Use Surging
- 2024 Facilities Trends Will Require Facilities and IT Teams to Work in Tandem
- NGFW vs. WAF. What’s the Right Firewall for You?
- Chris Hadfield’s Words To Live By
- Industrial Revolution 4.0 + IIoT
- Digital Fluency Drives Innovation
- Your Cloud Needs Protecting, Too
- Your building alarm systems could become obsolete. In 2024!
- Zero Trust 2.0: Zero Trust Data Resilience (ZTDR)
- We just got, or got used to, Wi-Fi 6. What is Wi-Fi 7?
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – 4th and Last in a Four-Part Series
- Why 2024 is the Year for AI Networking
- International Women’s Day is Tomorrow – Great Time to Think About…
- Data-Centric Security Step One: Classifying Your Data
- The Network – Unsung Hero of Super Bowl LVIII
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – Third in a Four-Part Series
- Boosting IT Team Performance by Fostering Intuition, Curiosity and Creativity
- Breach Remediation Costs Can Wipeout Bottom Line and Business
- Hoodied Hackers Now Favour Hugo Boss
- What Do You Need to Tell the Board? Business Metrics that CISOs Should Share – Second in a Four-Part Series
- How to Get People to Re-Engage After the Holidays
- What Does the Board Need to Know? Business Metrics that CISOs Should Share – First in a Four-Part Series
- Android Devices MUST be Updated + IT Departments Being Cut as Privilege Escalation Escalates
- Today’s Common Cloud Migration and Management Concerns
- Protect Your Healthcare Network from Cyberattack – Lives are at Stake
- Happy Halloween: Black Cats Lead to Boo….Hoo.
- Insurance Underwriters are Protecting Their Flanks
- Insurance Companies Cracking Down as Cybercriminals Become Better Business Builders
- Scary Cyberattacks Stats
- Parents, Profs and IT Professionals Perceive Back-to-School Through Different Lens
- Zscaler’s new IDTR and other tools that leverage generative AI
- Vanquish Vaping, Vandalism and Villainy
- Fabric for Fast-Paced Environments
- Changes to Cyber Insurance Requirements – What you Need to Know
- Cybersecurity Readiness – Newly Released Report
- Passwords Leaked…Again
- 10-Step Patch Management Checklist
- Remote – Again – For Now… and Still Maintaining Engagement
- Protecting Pocketbooks, Passwords and Property from Pilfering
- Raspberry Robin: Highly Evasive Worm Spreads over External Disks
- Cisco Introduces Responsible AI – Enhancing Technology, Transparency and Customer Trust
- Managing Customer Trust in Uncertain Supply Chain Conditions
- Hope on the Horizon
- Toys of Tomorrow… What will spark your imagination? Fuel your imagination?
- Protecting Purses and Digital Wallets
- The Password that Felled the Kingdom + MFA vs 2FA
- The MOE’s RA 3.0 and Zscaler
- 7 Critical Reasons for MS Office 365 Backup
- Penetration Testing Important, but…
- Social Engineering and Poor Patching Responsible for Over 90% of Cybersecurity Problems
- Breach Incidence and Costs On the Rise Again + 5 Ways to Reduce Your Risk
- Cybersecurity Insurance Policies Require Security Audits and Pen Testing
- Wireless strategies for business continuity gain importance as enterprise expand IoT, cloud, and other technologies
- How Cybercrooks are Targeting YOU
- Enabling Digital Transformation with Cisco SD-WAN
- WFH Post Pandemic – What It Will Look Like. What You’ll Need.
- Leaders to looking to the IoT to improve efficiency and resiliency
- Cyber Security Vernacular – Well, some of it, for now
- Why You Need Disaster Recovery, NOT Just Back-Ups
- 10 Reasons Why Having an Expert Manage Your Cybersecurity Makes Sense and Saves Dollars
- Converting CapEx IT Investments into Manageable OpEx
- The Hybrid Workplace – Planning the Next Phase
- Cisco Cloud Calling: Empowering Customers to Thrive with Hybrid Work
- When You Can’t Access the Cloud
- How to Keep On Keeping On
- New Cisco Research Reveals Collaboration, Cloud and Security are IT’s Top Challenges
- Threats from Within on the Rise
- Cloud Covered? If Not, Take Cover!
- Zero Trust and Forrester Wave Report
- Password Based Cyber Attack: Like Leaving Keys Under Doormats
- So, What’s Up With Sensors?
- Sensors and Systems Create a Digital “Last Mile” and Help Skyrocketing Costs
- Scanners Provide Peace of Mind for Returning Students and Workers
- Sensors Improve Operations and Bottom Line… Easily and Cost-Affordably.
- Cisco Meraki Looks at 2021
- 2020 Holiday Shopping: Cybersecurity and Other Tips to Safeguard Wallets and Systems
- How to make the most of the technology you have
- Personnel, Planet and Business Progress: More Interdependent Than Ever Before
- Sure… you can get them all in the boat – but can you get them to work well together?
- Pushing the Zero Trust Envelope – Cisco is Named a Leader in the 2020 Forrester Zero Trust Wave
- Cloud Data Must be Protected, Too!
- Don’t Let Anyone Get the Dirt on You – Make It Instead!
- How IoT Devices Can Help You and Your business
- WebEx – A World of Possibility
- Creating Your Breach Response Plan Now Will Save You Thousands Down The Road
- Been hacked? Here’s what you must do next.
- The Need for Pen Testing is At an All-Time High
- 5 Ways an IT Reseller Improves Your Performance and Peace-of-Mind
- 5G and Wi-Fi 6: Faster, more flexible, and future ready. Are you?
- Network and Data Security for Returning and Remote Workers + Disaster Recovery Symposium
- Collaboration and Cisco WebEx: Protecting Your Data
- Thursday’s Virtual Conference Tackles Today’s Supply Chain Trials and Tribulations
- 10 Tips to Reduce Cloud Storage Risk
- COVID-19 Crisis Fuelling IT Spending
- Supply Chain/Logistics Experts Share Their Expertise
- Cisco Breach Defence Overview
- Announcing Our New Website and Blog
NGFW vs. WAF. What’s the Right Firewall for You?
by Jane-Michèle Clark
May 15, 2024
It’s not exactly news to say that AI, ML and increasingly sophisticated cybercriminals because the frequency of cyberattacks and effectiveness of threat vectors to increase multi-fold over the past 12 months. It is also common knowledge that AWS users are prime targets.
Although most North American organisations are using the cloud to some degree, even if it’s just for application access, the very nature of the cloud is presenting challenges for organisations without internal IT expertise.
It is estimated that 87% of organisations are currently using a multi-cloud strategy, or are planning to adopt one before the end of 2024, and that 72% of organisations are already using a hybrid cloud approach.
These complex and dynamic architectures rewrite the security equation. Traditional data centres defend against perimeter threats, but cloud networks have no perimeter to separate trusted users, device or application access from unscrupulous attackers. Despite the many warnings from cybersecurity experts in the past 15 years or so… Pause for a second.
Yes, it has been that long! Amazon introduced the cloud in 2006. Microsoft Azure and AWS developed functional private clouds in 2010. The following year, IBM launched SmartCloud and Apple introduced iCloud.
As we were saying, despite the many warnings from cybersecurity experts, over 40% of organisations with 1000 employees or less (which describes 99% of Canadian companies), still do not understand the importance of protecting their perimeter. The expectation is that the carrier/provider will do so. You can read more about this, as well as about cloud outages and tips for protecting your cloud in our April 15, 2021 blog post.
Unfortunately, the concept of implied trust is obsolete in the cloud. This is the reason why the zero trust security model was introduced. Overly simplified, this approach limits access, reducing the attack surfaces to get smaller and smaller surfaces needing to be protected.
Regardless of where you are in your cloud journey, you need a firewall to protect your cloud. And that’s where it can be confusing for some. The question often being asked today: What’s the difference between NGFW and WAF… and aren’t they both just firewalls?
NGFW vs. WAF
Just in case you need reminding, NGFW stands for Next Generation Firewall and WAF stands for Web Applications Firewall.
As both technologies are indeed called “firewalls”, it’s easy understand where there is confusion around WAFs and NGFAs. The real difference is where are they are active (where they interact with traffic), and how they help protect your cloud and any information stored there or accessed through it.
An NGFW works at the network edge. In addition to all the features and benefits you get with traditional firewalls, NGFW technologies have been enhanced to include:
-
Intrusion Prevention Systems (IPS) which not only block malware, but actively scan network traffic looking for threats.
-
Use of AI and ML to continuously update threat recognition and protection.
-
Deep packet Inspection (DPI): With this approach, the body of each data packet is analysed, not just the header, as is the case with most traditional firewalls.
-
Traffic blocking based on the applications being accessed.
Adapting an analogy that is being used quite frequently these days, “Think of an NGFW as being the door to your home, and the WAF as keys to the individual bedrooms used by you and your roommates.”
I think it is an apt analogy and, like living and shared accommodations, your valuables are better protected when you have both types of protection. In many organisations, NGFWs and WAFs are managed by separate teams.
One of the biggest reasons is that a WAF is used more by the teams responsible for the apps, including developers. These specialists live and breathe the application, so they are best able to develop policies to address the vulnerabilities of each app. They are also best qualified to sound the alarm when cross-site scripting (XSS), broken authentication and other such attacks prompt unusual app behaviour.
When the app is ready s to be deployed, it is often passed to the IT security team. In our opinion, it is better to implement a formal DevSecOps program, so that security is embedded into the development process. Regardless, it is critical that there be collaboration between all teams involved in protecting the network, its applications and its data.
All that being said, for most organisations having a strong NGFW can be sufficient.
One of our partners, Palo Alto Networks, is a leader in this space (and so classified by Gartner), and one we recommend when appropriate.
Its NGFW firewalls can be deployed for cloud platforms like AWS or Azure and virtual machines or containers. The firewalls are governed by Panorama, Palo Alto Networks’ centralized firewall management platform, which provides unified rulemaking and visibility.
One of the comments we often hear: “Think that Palo Alto solutions are excellent, but they are sooo expensive!”. Palo Alto heard the same frame frequently, too, so PAN commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Palo Alto Networks Software Firewalls. You can view the report here.
One Last Point in terms of Strategic Planning
According to the 2022 Gartner Magic Quadrant for Network Firewalls report:
“By 2026, more than 60% of organizations will have more than one type of firewall deployment, which will prompt adoption of hybrid mesh firewalls.
By 2026, over 30% of the new deployments of distributed branch-office firewalls will be of firewall-as-a-service offerings, up from less than 10% in 2022.”
In the 2024 Gartner Magic Quadrant for Security Service Edge report, it says:
“By 2025, 80% of enterprises will have adopted a strategy to unify web, cloud services, and private application access using a SASE/SSE architecture, up from 20% in 2021.”