What is a Next-Generation Firewall?

Before, basic firewalling was situated in the 4th layer of the OSI model. In short, this meant the firewall was able to block or allow traffic based on the source or destination. For example, person X can browse the web, while person Y can’t or only person X can make and RDP connection to an external server.

These days there is more to the web than just web pages and browsers navigating them. We are having more and more different devices accessing the web, but also devices trying to access our network. To be able to provide secure access from and to our network, we need a firewall that understands more than just source, destination, and ports. This is where the Next Generation Firewall (NGFW) comes in, a device that is able to ‘see’ traffic up to layer 7 of the OSI model.

Wi-Fi Networks by EASI

What can a NGFW do for your network security?

Scan encrypted HTTPS traffic

Detect viruses that may be hidden in normal HTTP/HTTPS traffic (and would be allowed by a traditional firewall)

Allow or disallow certain traffic

Categorize the web traffic to decide if it is allowed (block/allow social media, ect... )

Blocking of types of content

Block certain content on a site without blocking the site itself (advertising, plugins, etc...)

Protection against malicious manipulations

Detect manipulations to your internal servers (SQL injection, Adobe Flash vulnerabilities, etc...)

We are already helping them

Breast International Group
Monument Vandekerckhove
Technical Airborne Components Industries
Médecins Sans Frontières
Vermeiren
Van De Velde
Doyen Auto
Maison Marie-Immaculee

Want more information or a quote? Contact us!

Recent articles

Security
Fabio Griffet
Fabio Griffet
06/07/2020
Why is End User Support As A Service successful? If we're honest there are several different elements who make this service so rewarding. In my opinion there are 4 main raisons.
End user support as a service EASI
Security
Fabio Griffet
Fabio Griffet
15/05/2020
In our daily office jobs, each employee uses up to five software applications a day and at least one of them is business crucial. The working of companies relies on the use of these different software packages ever more and we are used to them working perfectly, even flawless I w...
Security
Geert Van de Steen
Geert Van de Steen
16/04/2020
Have you received more spam recently? Train yourself and read on to see my 7 tips on how to recognize a phishing mail.