Networks are evolving rapidly. The proliferation of devices, users, applications, and services has made the network edge more porous, while at the same time expanding the attack surface. And these remote devices and applications are now commonly accessing data center resources in a way unimaginable just a few years ago. Add IoT and Cloud to a highly mobile and distributed network, and you have created the perfect storm for disaster.
Security has evolved organically as well. But not in a way that complements the evolution of the network. Instead, it is not uncommon for organizations to have security solutions from dozens of different vendors installed inside their distributed infrastructure. These siloed security devices use different management tools, different sources for threat intelligence, and have no ability to share critical information. It’s something often referred to as the accidental security architecture. And when combined with the growing security skills shortage, it’s a complex and expensive recipe for human error and unseen security gaps where advanced threats often pass unnoticed.
Unfortunately, the attack technology used by cybercriminals is organized, responsive, and designed to share information, while the security installed in most networks is not. It is designed to circumvent and exploit the weaknesses inherent in your accidental security architecture.
What’s needed is a way to integrate your security technologies together to close the security gaps. They need to share threat intelligence, management, and orchestration. They need to intelligently collaborate to respond to threats. And they need to operate using open standards for enhanced interoperability with your existing and future security investments. And central to a cohesive, integrated security strategy is the Enterprise Firewall.
Firewalls have undergone significant change since Digital Equipment Corporation engineers wrote the first paper on packet filtering in 1988. Here is a brief breakdown on the evolution:
Packet filtering and NAT are used to monitor and control packets moving across a network interface, apply predetermined security rules, and obscure the internal network from the public Internet
A proxy firewall is an intermediary device that terminates connection requests on one side of the proxy and builds a new network connection on the other. Because no packets actually pass through the proxy firewall, it is able to filter out unauthorized or infected traffic, and completely obscure the internal network by removing any identifiable source information. This level of security comes with significant performance challenges.
Stateful firewalling, also known as dynamic packet filtering, monitors the state of connections and makes determinations on what sorts of data packets belonging to a known active connection are allowed to pass through the firewall.
As security solutions began to multiply, many organizations did not have the IT staff necessary to install, manage, and monitor the growing array of specialized security technologies. UTM devices combined many of the most critical security functions – firewall, IPS, VPN, gateway antivirus, content filtering, load balancing, etc. – into a single device, usually with a unified management console. While this is still a powerful solution for many smaller organizations, the challenges for growing enterprises include limited performance, a single point of failure, and deploying security across an increasingly distributed network environment.
This term was coined by Gartner in late 2000 to describe a new sort of all-in-one security appliance based on the UTM model, but combined with enterprise-class scalability and performance, and a focus on granular inspection of Layer 7 application traffic.
In spite of these advances in firewall technology, they are still isolated security devices inspecting traffic passing through a single network chokepoint. This model is increasingly ineffective as networks become increasingly distributed and borderless. Firewalls are still the basic building block of any security strategy, but now they need to be part of a tightly integrated, highly collaborative, and widely distributed security fabric.
These new Enterprise Firewalls become the foundation on which organizations can build an intelligent and highly interactive security architecture. Fortinet has just announced such an architecture, called the Fortinet Security Fabric. It is a tightly integrated set of security technologies that can be woven into the network, and designed share threat intelligence, collaborate to provide coordinated threat response, and adapt dynamically to the changing threat landscape.
The Fortinet Enterprise Firewall plays a pivotal role in this new Security Fabric. Utilizing FortiGate’s common management, and unified operating system available in wide variety of form factors, organizations can distribute consistent firewall security across the network. And its flexible API design allows it to interoperate across Fortinet’s entire portfolio of security solutions as well as its rich ecosystem of third-party alliance partners - without ever sacrificing performance or business functionality.
The answer to an increasingly complex network environment and sophisticated threat landscape cannot be compounding the accidental security architecture we already have in place. The best answer to complexity is simplicity. Which is exactly what the new Fortinet Security Fabric is designed to deliver. Evolved security designed for the next generation of digital business networks.