The purpose of this clear paper is to discuss changes in network security and what will be needed to protect the organization’s environment in the future.
As networks become more diverse, it becomes increasingly difficult for organizations to achieve sustainable political governance and implementation and to maintain a unified image. The complexity of the interconnection of these interconnected networks often leads to errors or erroneous patterns, making them vulnerable to ever-changing firewall specialist.
What can the agency do to regain control and achieve sustainability? Start with an integrated security system that sets up the front and center wall.
Firewalls remain the cornerstone of an organization’s network security strategy, but just as networks have evolved, so must our firewalls. In the past, the firewall was a single device in the I / O “perimeter” that acted as a policy-based checkpoint to allow or deny network traffic. To be successful in today’s digital world, organizations must think beyond individual firewalls and adopt the “firewall,” a policy-based method for strategically coordinating advanced security protections at logical checkpoints across heterogeneous networks.
The firewall will be an important step for organizations to better adapt to security and business trends and the need to connect. Cisco has worked hard to build an integrated security system with our base walls to enable businesses to make the transition.
Through firefighting, e-commerce organizations can achieve a strong security environment today, while building bridges to meet business and tomorrow’s security requirements.
Changing network security
Traditionally, a firewall is placed as a passage around a network. He acted as a checkpoint for everyone, checking network traffic as he circled around this circle. At the entrance / place for the participants, the fire network was responsible for the validation
communication: internal network traffic is considered reliable, and external trust is also considered. Laws and policies have been issued and implemented this directive to ensure that traffic is required and available online and looga prevent unsafe traffic.
Compared to the perimeter area compared to the motorcycle surrounding a large building, the reduction works like a drabridge that manages all traffic and that of the castle.
The clouds came to the side. Application.
This practice of forcing the control of a control group was immediately recognized. First, there is the possibility of a long-term phase of corporate restructuring. But the change has really changed the cloud. As the business moved to the clouds, devices and users began to move out of the control network, resulting in such a control system not working. Soon there were more rounds. They all need protection. There is no effective way to put moat online.
Today, increasing use of branch offices, remote employees, and cloud services bypass traditional security checkpoints and extract more information from the traditional “environment.” Additionally, many businesses have adopted their own device model (BYOD), which allows employees to access sensitive work applications via personal computers or mobile devices. In fact, more than 67% of employees use their devices at work – a trend that is increasing without seeing the end. Mobile devices and laptops connected to open Wi-Fi networks are loved by everyone, and are essential even for day-to-day business operations.
Additionally, most workplaces and users need direct access to the Internet, where essential cloud-based applications and a large proportion of ever-expanding data are now available. Businesses use workloads across many cloud services, operating systems, hardware devices, databases, and more. Applications and data are becoming more centralized, and networks are becoming more diverse.
Why a firewall?
As our network changes to acquire new ways of doing business, so will our network security. In today’s world of distributed IT resources, firewalls are still essential for a secure security environment.
However, the firewall repository has expanded significantly to protect multiple network networks, connected devices, and operating systems from critical threats. As a result, our “traditional” firewall devices are added by a combination of physical and application applications – some embedded in networks that provide other services, such as services, guest support, or embedded in the public cloud. The port is also taking on a variety of new features, such as increasingly integrated applications, software running on personal devices, SD-WAN users and secure network access. The function of sharing threat intelligence across these insecure firewalls, regardless of their location, is key to suffering from danger and strong security.
In order to completely change the security of the network today, the business will abandon the traditional “perimeter” approach. Instead, it will establish a key across the entire network, near information or applications that should be protected. In particular, the creation of microperimeters and physical and logical control have become an important reality.
We need to think a little bit about the firewall as a standalone physical network device and more about the performance of the firewall.
What is a firewall?
Make no mistake: firewall is more important than ever. Of course, to protect today’s network, we need more firewalls everywhere. The difference is that the firewall is aimed at establishing rules based on rules everywhere:
The fire station can provide a simpler and more integrated approach to centralized policies, advanced security features, and similar application to an increasingly complex network. It should provide complete security, visibility, policy agreement, and improved user and device authentication. The firewall should also benefit by sharing threat intelligence across all levels of control to create the same visibility and control of the threat, greatly reducing the time and effort required to find, investigate and detect fix threats.
In this way, firewalling becomes an important strategy to protect your complex network today. And it provides a bridge in the future as your business and threat continue to evolve.