Skip to content

網絡安全要素 #1:防火牆

The Firewall is Here to Stay

A firewall is a network security device that monitors incoming and outgoing network traffic and decides whether to allow or block specific traffic based on a defined set of security rules. Firewalls have been a first line of defense in network security for decades. They establish a barrier between secured and controlled internal networks that can be trusted and untrusted outside networks, such as the Internet. 

Firewalls have evolved beyond simple packet filtering and stateful inspection. Most companies are deploying next-generation firewalls to block modern threats such as advanced malware and application-layer attacks. Next-generation firewalls (NGFW) are more sophisticated than packet-filtering and stateful inspection firewalls. Why? They have more levels of security, going beyond standard packet-filtering to inspect a packet in its entirety. That means inspecting not just the packet header, but also a packet’s contents and source. NGFW are able to block more sophisticated and evolving security threats like advanced malware.

Necessary Capabilities

Advanced Threat Protection

Most traditional firewalls integrate with a separate intrusion prevention system (IPS) to gain additional security features. Next generation firewalls have IPS capabilities built in to protect against a wide variety of threats, such as DDoS attacks, malware and spyware. Further integration with threat intelligence systems like SIEM provide advanced layers of protection to defend against the modern threat landscape. 

SSL Inspection

Malicious threats can be hidden within encrypted web traffic. In order to filter out malicious content, the NGFW intercepts encrypted web activity to filter out malicious activity through a “man in the middle” approach. The NGFW will first decrypt the incoming web traffic and then scan for threats like malware or viruses. After its examination, the traffic will be encrypted and forwarded to the user so that the user can access the data as originally intended. 

Application Control

The users on your network use several tools on their devices, such as email, social media and other vendor applications. Some of these web applications can be malicious and lead to open backdoors that can be exploited to enter your network. Application control allows organizations to create policies that either allow, deny or restrict access to applications. This not only protects organizations by blocking risky applications but also helps them manage their application traffic to ensure availability for business-critical resources. 

User Identity Awareness

User identity awareness allows organizations to enforce policies that govern access to applications and other online resources to specific groups or individuals. The NGFW integrates with your authentication protocols (such as LDAP or Active Directory) so that access is governed by user identity as opposed to IP address. User identity awareness not only helps organizations control the types of traffic allowed to enter and exit their network but also manage their users.

Deep Packet Inspection

Deep packet inspection inspects data to identify and filter out malware and unwanted traffic. By inspecting the content of a data packet, the NGFW can intelligently determine which applications are being used or the type of data being transmitted. This allows the firewall to block advanced network threats (such as DDoS attacks, trojans, spyware and SQL injections) and evasion techniques used by threat actors. 

Centralized Management

Firewalls need proper security management to ensure that they meet the security needs of the organizations that need protection. Firewall capabilities need to be updated and firewall rules need to ensure they are being properly enforced. Centralized management of your firewall(s) is crucial in gaining on overall view of your firewall configurations. Organizations need to ensure they can scale their firewall to ensure that their organization has maximum protection to fit their growth needs.

Reporting & Insights

Firewalls generate logs that detail information about security and network traffic that security administrators review to understand the overall activity. This information provides organizations with useful insights to help them prioritize application traffic and understand their network security and monitor user activity.

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About Portnox
Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit http://www.portnox.com, and follow us on Twitter and LinkedIn.。

ESET 與英特爾合作,通過基於硬件的勒索軟件檢測增強端點安全性

BRATISLAVA — March 3, 2022 — ESET, the leading endpoint protection platform vendor headquartered in Europe, has set out to integrate Intel® Threat Detection Technology (Intel® TDT) into its multi-layered cybersecurity technology suite.

Recognizing the complex and evolving nature of ransomware, an ever more formidable threat to customers’ work and personal lives, ESET will enhance its software-based detection technologies with a ransomware detection only Intel hardware can deliver. With progress in technological innovations often bringing new tools for the sustained growth and security of SMBs, the integration of Intel TDT means that ESET endpoint security software running on Intel-based PCs can deliver superior ransomware protection.

“This collaboration recognizes the immediate boost in ransomware protection that integrating Intel’s hardware-based ransomware detection technology can deliver. Tapping into telemetry at the CPU level is an effective step we can take to enable improved tracking of malicious encryption. Basically, for ESET this means exposing ransomware as it attempts to avoid detection in memory. ESET has always believed in the multi-layered approach, and by adding the silicon layer we recognize that hardware-based security is the next milestone in battling threats,” shares Előd Kironský, Chief of Endpoint Solutions and Security Technologies at ESET.

Due to the devastating impacts of past ransomware attacks and the increasing complexity of maintaining secure endpoint defenses, ransomware remains a top concern across the industry. To better address this, integrating ransomware detection improvements to ESET endpoint security solutions will provide enhanced immunity to most detection bypasses. Furthermore, with Intel TDT machine learning constantly evolving and progressing, the ability of ESET endpoint security solutions to detect derivative variants of ransomware threats will progress in lockstep.

For ESET and its clients, the value proposition of this collaboration lies in the parallel benefits of using Intel TDT machine learning models to assist with the detection of ransomware and simultaneously off-loading these processing demands to the Intel integrated graphics controller (GPU), keeping overall system performance high.

“Low impact to system performance is an area that ESET has always prioritized within its multi-layered software architecture and is a key selling point for many of our clients. Leveraging tech that can help us with prevention and protection, while also preserving performance is a win-win choice,” says Kironský.

The benefits of this integration will become available later this year in an upcoming release of ESET’s endpoint security products. In the first round of releases, ESET will focus on endpoints with 9th Gen and newer Intel Core™ and Intel vPro Windows based PCs, which are capable of leveraging Intel TDT out-of-the-box.

“Ransomware impacts both small businesses and large enterprises and can result in economic fallout on a global scale. We are excited to partner with ESET which delivers a true global deployment footprint. ESET’s ransomware optimizations will work across both Intel vPro Enterprise and our new Intel vPro Essentials targeted for SMBs. This delivers a compelling hardware and software bundle that delivers right-sized security for businesses of any size and delivers higher efficacy security when ESET software is run on Intel-based PCs. This is a major step forward to turn the tide against ransomware,” said Carla Rodriguez, Sr Director Ecosystem Partner Enablement, Intel Corp. 

About Version 2 Limited
Version 2 Limited is one of the most dynamic IT companies in Asia. The company develops and distributes IT products for Internet and IP-based networks, including communication systems, Internet software, security, network, and media products. Through an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 Limited offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.

About ESET
For 30 years, ESET® has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET’s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single “in-the-wild” malware without interruption since 2003.