Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Executive Summary
Commissioned By Fortinet
Eighty-seven percent of IT security professionals surveyed reported their organizations have Fortinet commissioned this
experienced at least one breach within the past 12 months. study to examine the
purchase and implementation
considerations, as well as the
challenges faced, for next-
Key Findings generation firewalls.
Forresters study yielded the following best practices for NGFW evaluation:
To explore this topic, Forrester
conducted a quantitative
survey of 150 IT security
professionals at midlevel
Thoroughly test organizations with next-
Conduct an
solutions within generation firewall
honest internal
your own implementations.
assessment.
environment.
Deploy NGFWs in
Identify and vet a front of your
wide cast of organizations
vendor solutions. most sensitive
data.
Next-Generation Firewalls Are The Cornerstone Of Zero Trust
In a Zero Trust network, next-generation firewalls act as segmentation gateways. Unlike traditional firewalls,
NGFWs can be placed at the center of the network in front of the data they need to protect rather than at
the edge of the network, which is a core tenet of Zero Trust.
Phishing
Positioning a NGFW at the center of the network
46%
N = 61 provides visibility into data access and greatly increases
Vandalizing of website or
45%
your chances of discovering an intrusion before it
manipulation of site content N = 62
escalates into a data breach. Fifty-six percent deployed
NGFWs in front of dedicated network segments, effectively creating microperimeters, and 49% deployed
them in the data center an indication that midlevel enterprises are well on their way to adopting Zero Trust.
As you plan your NGFW implementation, it is important to identify key points in your network for deployment.
According to a recent Forrester survey on global security trends, 50% of midlevel US organizations had implemented NGFWs or had
plans to expand their implementation, and another 22% planned to adopt NGFWs within the next 12 months.
Understand the infrastructure, staffing, and budgetary implications of implementing a NGFW. The
security pros surveyed weighed technical factors as well as cost, implementation time, and the IT resources
needed to manage the solution. Be sure to conduct a thorough assessment of all implications of a NGFW
implementation.
Conduct an honest internal evaluation. The vast majority placed high priority on all NGFW features during
the evaluation phase. But most respondents only used select features once they were implemented, with just
antivirus and application control capabilities used by more than 50% of respondents. If you are running point
products with capabilities redundant with a NGFW, beware you may encounter inefficiencies.
Identify the contenders. Nearly two-thirds would consider a broader selection of vendors if they could do it
again. Identify the NGFW vendor solutions that best fit your requirements, and use product demos, a proof of
concept, bake-offs, and third-party testing to generate your shortlist.
Test before you buy. Seven out of 10 survey respondents said if they could go back in time, they would do
more extensive testing of capabilities. Be sure to thoroughly test solutions in your own environment.
What would you do differently if you had to select and deploy an NGFW again?
(Select all that apply)
Zero Trust is becoming widely adopted by leading, cutting-edge organizations. As data breaches continue to
devastate businesses and governments, more security organizations are under pressure to create new ways of
protecting their critical data by turning to a Zero Trust data-centric network security model powered by NGFW
technology.
To read the full results of this study, please refer to the Thought Leadership Paper commissioned by Fortinet
titled, Your Best Defense: Next-Generation Firewalls Enable Zero Trust Security.
2015, Forrester Research, Inc. All rights reserved. Unauthorized reproduction is strictly prohibited. Information is based on best available
resources. Opinions reflect judgment at the time and are subject to change. Forrester, Technographics, Forrester Wave, RoleView,
TechRadar, and Total Economic Impact are trademarks of Forrester Research, Inc. All other trademarks are the property of their respective
companies. For additional information, go to www.forrester.com. [1-WFUIC3]