Next Generation Firewall Buyer'S Guide: Check Point
Next Generation Firewall Buyer'S Guide: Check Point
TABLE OF CONTENTS
The Cyber Security Landscape Is Shifting.................................. 3
Firewall Defined.......................................................................... 4
Gen V
Mega
Generation 5—Approx. 2017, large scale, multi-vector, mega attacks
Gen IV using advanced attack tools and is driving advanced threat
Payload prevention solutions.
Gen III Generation 4—Approx. 2010, rise of targeted, unknown, evasive, polymorphic
attacks affected most businesses and drove anti-bot and sandboxing products.
Applications
In 2018, we saw multiple ransomware attacks like WannaCry impact healthcare and expand the threat
attack surface to IoT medical devices. In 2019, the World Economic Forum listed Cyber attacks among
the top 5 threats to global economic development.
The frequency and costs of data breaches also continue to climb. The global average total cost of a data
breach is $3.92 million. The highest country average is the United States at $8.19 million. The highest
industry average is healthcare with a cost of $6.45 million. The time to identify and contain a breach is
almost a year at 279 days.3 How will Next Generation Firewalls cope with 5th generation cyber attacks
and traffic growth at hyper-scale?
CHECK POINT NEXT GENERATION FIREWALL BUYER'S GUIDE | 4
Firewall Defined
A Firewall is a network security device that
monitors incoming and outgoing network traffic. TYPES OF FIREWALLS
A Firewall enforces an organization’s security
• Packet Filtering: Data is blocked or permitted
policy by filtering network traffic. At its most
basic a Firewall is essentially the boundary or
based on a small amount information (e.g.
barrier between two networks to identify threats network address) in the header of each packet.
in incoming traffic and blocks specific traffic,
• Proxy Service: Network security system
once flagged by a defined set of security rules,
while allowing non-threatening traffic through.
that protects while filtering messages at the
application layer.
Firewalls have existed since the late 80’s and
started as “packet filters,” which were networks • Stateful Inspection: Dynamic packet
set up to examine packets transferred between filtering that monitors active connections to
computers. They’ve come a long way since then, determine which network packets to allow
but the basic principle behind why they’re so through the Firewall.
important remains: It allows an organization to
enforce security policies at the network level, • Next Generation Firewall: Deep packet
protecting all the devices behind the firewall inspection Firewall with application-
without having to implement these policies on level inspection.
every device.
Virus: A virus is a malicious, downloadable file that attacks by changing other computer
programs with its own code. Once it spreads those files are infected and can spread from one
computer to another, and/or corrupt or destroy network data.
Worms: A worm is a standalone malware that can propagate and work independently of other
files, where a virus needs a host program to spread. They can slow down computer networks by
eating up bandwidth as well as the slow the efficiency of your computer to process data.
Trojan: A trojan is a backdoor program that creates an entryway for malicious users to
access the computer system by using what looks like a real program, but quickly turns out to
be harmful. A trojan virus can delete files, activate other malware hidden on your computer
network, such as a virus and steal valuable data.
Spyware: Much like its name, spyware is a computer virus that gathers information about a
person or organization without their express knowledge and may send the information gathered
to a third party without the consumer’s consent.
Adware: Can redirect your search requests to advertising websites and collect marketing data
about you in the process so that customized advertisements will be displayed based on your
search and buying history.
Ransomware: This is a type of trojan cyberware that is designed to gain money from
the person or organization’s computer on which it is installed by encrypting data so that it is
unusable, blocking access to the user’s system.
It also should be noted that Firewalls are ubiquitous in regulatory compliance regimens. They are usually
mandated to protect in-scope systems from the Internet and from other parts of the organization’s
environment. They are configured with security policies that deny all traffic except that required for
production applications, and can also apply threat prevention controls required to be in compliance.
CHECK POINT NEXT GENERATION FIREWALL BUYER'S GUIDE | 6
This Next Generation Firewall Guide will define the mandatory capabilities of the next-generation enterprise
firewall . You can use the capabilities defined in this document to select your next Enterprise Firewall
solution. In addition, we will explain how Check Point’s solution goes beyond the basic requirements and
provides best-in-class enterprise firewalls for any size business. Like Gartner, we focus on transformational
technologies or approaches that deliver on the future needs of end users and businesses. Given the
term “Next Generation Firewall” (NGFW) is still used by a majority of the industry we will use both “Next-
Generation” and “Enterprise” firewall terms interchangeably in this document.
MANAGEMENT
Effective enterprise firewall architectures are impossible without superior management.
The features on a firewall are useless if they can’t be used efficiently, so the quest for a
next-gen firewall starts with the management platform. Security management is not simply
a matter of configuration; the complete security operational paradigm must be considered:
• Number one is ease of use, where the UI reduces the man-hours required to complete an operation.
In other words, choose the best tool for the job.
• Consistent policy implementation across the security infrastructure (including but certainly not limited to
the firewalls)
CHECK POINT NEXT GENERATION FIREWALL BUYER'S GUIDE | 7
• Scale (devices under management, number of administrators, and number of roles/teams involved
in operations)
• Automation and orchestration: With third-party IT and Security solutions, and with data center
virtualization, cloud and DevOps automation;
THREAT PREVENTION
The most significant capability added to enterprise firewalls has been the integration of
robust threat prevention. Initially the focus was on integrating IPS to consolidate hardware,
but modern firewalls must go far beyond that: sandboxing, anti-phishing, anti-virus and
anti-bot are all possible threat prevention techniques. Many vendors use cloud-based analytics and threat
intelligence in conjunction with their firewalls. These cloud platforms push threat prevention updates down
to the firewalls, and receive malware indicator updates so they can be shared with others. In addition, today’s
enterprise firewall must integrate with third party NAC and analytics systems that dynamically push IoCs to
the firewall, creating a more secure and resilient ecosystem.
SCALABLE PERFORMANCE
WITH ADVANCED SECURIT Y FUNCTIONS
The wide variety of services supported by next-gen firewalls require significant amounts
of compute and memory resources, which can create performance bottlenecks and affect
application availability and user experience. There are multiple approaches to dealing with this consideration,
all of which have their advantages and drawbacks. However the key requirements are being able to easily
scale performance as requirements increase, and that hardware limitations don’t prevent you from
deploying the latest threat prevention technologies and algorithms, or result in very different performance
considerations in virtual or cloud versus hardware deployments.
Centralized Management
Centralized management of unified policy that supports
application-based controls that are user, content and data aware
Automation
Fully automated rules and shared intelligence
• A single policy construct across all enforcement points in the Infinity architecture
• Combined threat prevention and segmentation policies in a unified policy table across appliances, virtual
and cloud
• Compliance control validation, with template support for common compliance regulations
• Orchestration integration for virtual and cloud environments, including automated services insertion
Unified Access Policy: Write once, deploy anywhere with full identity and application awareness.
Check Point’s management has been developed based on the real-world lessons learned over 25 years of
customer experience operating our firewalls and security gateways. As a result, we are able to deliver up to
a 50% reduction in human investment for ongoing operations. An exhaustive description of our management
capability is clearly beyond the scope of this document, however in the final analysis it’s the management that
makes the difference between success and failure when it comes to operationally viable network-based security.
CHECK POINT NEXT GENERATION FIREWALL BUYER'S GUIDE | 11
THREAT PREVENTION
A key Check Point differentiator
when compared to other
firewalls is the integration
of best-in-class threat prevention across the
architecture. While others concede attackers
will get in and are pivoting to detection and
response, our focus remains on stopping attacks
before they succeed. This includes tackling the
latest large-scale, multi-vector GenV attacks, in
addition to more conventional attacks that are Many enterprises still rely on outdated prevention technology.
still widely used.
• ThreatCloud is a Cloud-based platform that shares and delivers real-time dynamic security intelligence to
the Infinity architecture, including our firewalls, security gateways, mobile and endpoints
• New ThreatCloud AI engines that detect malware well beyond AV and static analysis, while reducing false
positives ten-fold
• SandBlast Threat Emulation sandboxing which blocks even zero-day attacks before they can begin their
evasion techniques
• SandBlast Threat Extraction which delivers safe and clean files to users thus protecting them from
infection. Includes web threat extraction and document sanitation for web downloads
• Anti-phishing which detects phishing attacks and blocks them before users can get infected
• Anti-Ransomware which detects and blocks ransomware attacks, and restores any files initially encrypted
Cyber Attack Dashboard: See overall threat trends with full drill down to identify and respond to high-risk attacks immediately.
CHECK POINT NEXT GENERATION FIREWALL BUYER'S GUIDE | 12
SCALABLE PERFORMANCE
WITH ADVANCED SECURIT Y FUNCTIONS
Check Point’s portfolio offers powerful scaling options for both hardware and software-
based firewalls. The Maestro Hyperscale solution brings the scale, agility and elasticity of
the cloud on premise with efficient N+1 hardware clustering based on Check Point HyperSync technology. Up
to 52 gateways/firewalls can be clustered to deliver up to 1,000 Gbps of throughput, while still being managed
as a single entity. Start with
what you need today, knowing
that you can easily scale when
needed without risky and
complex upgrades or network
re-designs.
• How should I weigh the importance of each capability, based on what is most important to me?
• Can I eliminate other tools and devices if I deploy enterprise firewalls broadly, lowering both capital
investment and staff costs?
• What is going to be my approach to scaling performance, given the inevitable increase in traffic and
sophistication required to combat the ever-evolving threat landscape?
• What IT and Security infrastructure will I need to integrate with the firewalls and their supporting
components?
• Most importantly: Have I thought through the complete operational model I will use to provision, monitor,
and upgrade these devices, consistent with my staff size and capabilities?
Like any technology, next-gen firewalls are only part of the solution: people, policies and procedures are
essential to building and operating an effective security architecture. By combining all of these, organizations
take a big step towards protecting their sensitive assets, meeting compliance requirements, and driving
digital transformation.
• https://www.checkpoint.com/products/
• https://www.checkpoint.com/products/security-gateway-appliances/
• https://www.checkpoint.com/products/next-generation-firewall/
• https://www.checkpoint.com/products/maestro-hyperscale-network-security/
• https://www.checkpoint.com/solutions/data-center-firewall/
• https://www.checkpoint.com/solutions/enterprise-firewall/
• https://www.checkpoint.com/solutions/small-medium-business/
Worldwide Headquarters
5 Ha’Solelim Street, Tel Aviv 67897, Israel | Tel: 972-3-753-4555 | Fax: 972-3-624-1100 | Email: [email protected]
U.S. Headquarters
959 Skyway Road, Suite 300, San Carlos, CA 94070 | Tel: 800-429-4391; 650-628-2000 | Fax: 650-654-4233
www.checkpoint.com
© 2019 Check Point Software Technologies Ltd. All rights reserved.