Gartner Research

Network Firewalls: The Changing Face of Network Defense

Published: 07 August 2013

ID: G00250104

Analyst(s): Eric Maiwald


Firewalls continue to be an important component of security architecture. However, like any other safeguard, they are not a panacea of protection. The evolution of enterprise networks, firewall inspection mechanisms and network speeds has resulted in changes to firewalls, and these changes continue.

Table Of Contents

Summary of Findings


  • Positive Security Model
  • Attack Protection
  • Content Layer Control
  • Denial of Service
  • Firewall Functions
    • Prevention
    • Detection
    • Deception
  • Assurance
  • Management
  • Information Sharing
  • Use Cases
    • Perimeter for Inbound Traffic
    • Campus Perimeter for Outbound Traffic
    • Internal Data Center Zone Perimeter
    • Public Cloud
  • Future Directions
    • IPv6
    • The Impact of SDN
    • Overlay Networks
  • Buying Center Shift
  • Strengths
  • Weaknesses
  • Gartner Definitions
    • Next-Generation Firewalls
    • Network IPS
    • Secure Web Gateway
    • Security in the Switch
    • Stateful Firewalls
    • Unified Threat Management
    • Web Application Firewall

The Details

  • What Are the Basic Issues?
    • How Do Firewalls Fit Into the Information Security Architecture?
    • What Level of Inspection Is Appropriate for Firewalls to Perform?
    • What Is the Relationship Between Firewalls and Intrusion Detection and Prevention?
    • Will Firewalls Help With Internal Network Security?
    • What Are the Issues Surrounding the Management of Firewalls?
    • To What Extent Do Firewalls Impact Network Architecture?
    • How Can Firewalls Be Incorporated Into a Virtualized Data Center?
    • How Can Firewalls Be Used With the Public Cloud?
    • How Will SDN Impact the Firewall?

Recommended Reading

©2020 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. and its affiliates. This publication may not be reproduced or distributed in any form without Gartner’s prior written permission. It consists of the opinions of Gartner’s research organization, which should not be construed as statements of fact. While the information contained in this publication has been obtained from sources believed to be reliable, Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Although Gartner research may address legal and financial issues, Gartner does not provide legal or investment advice and its research should not be construed or used as such. Your access and use of this publication are governed by Gartner’s Usage Policy. Gartner prides itself on its reputation for independence and objectivity. Its research is produced independently by its research organization without input or influence from any third party. For further information, see Guiding Principles on Independence and Objectivity.

Already have a Gartner Account?

Become a client

Learn how to access this content as a Gartner client.