Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Firewall Evolution: 5 Milestones, 5 Predictions

    By
    Chris Preimesberger
    -
    September 10, 2013
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      PrevNext

      1Firewall Evolution: 5 Milestones, 5 Predictions

      0-Firewall Evolution: 5 Milestones, 5 Predictions

      By Chris Preimesberger

      2Milestone: The Firewall as a Proxy

      1-Milestone: The Firewall as a Proxy

      In the early 1990s, the firewall was a primitive piece of technology—really just a proxy. During this period, the proxies were often pushed to the perimeter of a network and used to proxy traffic resources within the internal network. The traffic could be filtered and shaped to certain resources.

      3Milestone: Packet Filters

      2-Milestone: Packet Filters

      During the early 1990s, there were also packet filters, which ran on servers that inspected traffic coming into the network. This is where administrators would create security policies and, in effect, rudimentary rule bases, which performed packet filtering based on five attributes of TCP/IP: Source IP, Source Port, Destination IP, Destination Port and Destination Protocol.

      4Milestone: Stateful Firewalls

      3-Milestone: Stateful Firewalls

      While packet filtering only looks at an individual packet at a time, using stateful packet inspection, firewalls are able to retain packets until there is enough information to make a sound “yes” or “no” decision. Stateful firewalls are still used today, but that is starting to change.

      5Milestone: Unified Threat Management Becomes the Latest Buzzword

      4-Milestone: Unified Threat Management Becomes the Latest Buzzword

      In the early 2000s, unified threat management (UTM) devices emerge in the market, providing an all-in-one appliance that combines Secure Sockets Layer (SSL) virtual private networks, anti-virusware, intrusion-prevention systems (IPSes), and firewalls.

      6Milestone: Next-Generation Firewalls (NGFWs)

      5-Milestone: Next-Generation Firewalls (NGFWs)

      The latest evolution in firewall IT is the next-generation firewall, which filters packets based on much more granular policies for application and user traffic. Additionally, these NGFWs can integrate IPSes as well as many other security functions into the firewalls’ decisions to block malicious traffic.

      7Prediction: Firewalls Are Becoming Virtual

      6-Prediction: Firewalls Are Becoming Virtual

      Over the next few years, organizations will see firewalls becoming much more virtual, instead of being a stagnant appliance on networks. Like a traditional firewall, these virtual/hypervisory-level firewalls will inspect packets and use security policy rules to block unapproved communication between virtual machines. While these virtual/hypervisor-level firewalls will not replace dedicated firewalls operating at or near wire speeds, there will be more demand for these firewalls as organizations begin to mix workloads with different security requirements on the same physical box.

      8Prediction: Cloud-Based Firewalls

      7-Prediction: Cloud-Based Firewalls

      Since there is a rise in both cloud computing and mobile devices, analysts have predicted that there might be an increase in cloud-based firewalls that will become more focused by services, such as Web application firewalls (WAF).

      9Prediction: More Cross-Pollination With Other Security Capabilities

      8-Prediction: More Cross-Pollination With Other Security Capabilities

      We’ve already seen a lot of integration with UTM technology and NGFWs, and we will move beyond simply adding more capabilities onto a box and more effectively integrating the data and capabilities to get faster and better decisions made. For example, this would mean having a security information and event management, or SIEM, platform correlate data from the gateway and dynamically adapt the firewall rules to mitigate specific threats.

      10Prediction: Deeper Content Inspection

      9-Prediction: Deeper Content Inspection

      Content inspection can always be improved as new generations of firewalls come into the market. As each generation of inspection software enters the market, it runs leaner and faster and is generally more efficient.

      11Prediction: Managing Firewalls With the Business in Mind

      10-Prediction: Managing Firewalls With the Business in Mind

      More decisions in larger organizations will be made from the perspective of a business application, rather than from strictly a firewall/security perspective as networks become increasingly complex. This is a trend throughout the software industry. By business application, we mean—as one example—a credit card processing service that is necessary for an e-commerce organization to run and make money. Therefore, if a firewall rule is preventing the application from working or slowing down the performance, then the organization will suffer. This is a new way of looking at how firewalls are managed, which continues to evolve.

      PrevNext

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×