IT PARK
    Most Popular

    Business Intelligence BI Industry Knowledge - Aerospace, Satellite Internet Industry

    Jul 13, 2025

    What is AI?

    Jul 07, 2025

    What does the server mean

    Jul 24, 2025

    IT PARK IT PARK

    • Home
    • Encyclopedia

      Who is more secure, fingerprint recognition or password?

      Aug 02, 2025

      What are "Other" and "Other System Data" on iPhone and how do I clean them up?

      Aug 01, 2025

      Cell phone "a daily charge" and "no power to recharge", which is more harmful to the battery?

      Jul 31, 2025

      Why does the phone turn off when the remaining battery is not zero

      Jul 30, 2025

      Internet era! How to prevent personal information leakage

      Jul 29, 2025
    • AI

      Is AI taking human jobs? Here are 5 ways we might be able to combat it

      Aug 02, 2025

      Coping with the "blind spot" of application in the age of artificial intelligence, and finding the "point of view" from the power of time.

      Aug 01, 2025

      AI fraud is efficient and low cost, and the "three magic tricks" effectively prevent potential threats

      Jul 31, 2025

      Many people use AI to help them work: less time to work and more money to earn

      Jul 30, 2025

      Driving Generative AI Pervasiveness: Intel's "duty to do so"

      Jul 29, 2025
    • Big Data

      Uncover 10 big data myths

      Aug 02, 2025

      3 Ways to Overcome Big Data Obstacles

      Aug 01, 2025

      How big data analytics is reshaping the future of smart cities

      Jul 31, 2025

      3 Ways to Successfully Manage and Protect Your Data

      Jul 30, 2025

      Big data is transforming education

      Jul 29, 2025
    • CLO

      The 6 principles of cloud computing architecture design, do you follow them?

      Aug 02, 2025

      How India can seize a rare opportunity in cloud computing

      Aug 01, 2025

      To make more environmentally friendly use of the cloud IT infrastructure, start with these aspects

      Jul 31, 2025

      Cloud computing, what are the main security challenges

      Jul 30, 2025

      What is cloud computing?

      Jul 29, 2025
    • IoT

      Why Edge Computing Matters to Your IoT Strategy

      Aug 02, 2025

      Iot and Internet misconceptions, which ones do you know?

      Aug 01, 2025

      5 Secrets to Maximizing Return on Investment in IoT

      Jul 31, 2025

      The Role of Industrial IoT Technology in Smart Factories

      Jul 30, 2025

      Is it too early to exit the IoT?

      Jul 29, 2025
    • Blockchain

      Zamna uses blockchain to verify passenger information and has landed on Emirates

      Aug 02, 2025

      What does blockchain mining mean?

      Aug 01, 2025

      NFT, from the "art" of Internet natives to the marketing tools of business

      Jul 31, 2025

      What are the main areas of potential application of blockchain in the construction industry?

      Jul 30, 2025

      Difference between blockchain games and regular games

      Jul 29, 2025
    IT PARK
    Home » CLO » Last-generation firewalls won't meet cloud demands
    CLO

    Last-generation firewalls won't meet cloud demands

    Previous Generation Firewall (LGFW), the term Next Generation Firewall (NGFW) was coined 15 years ago.
    Updated: Jul 10, 2025
    Last-generation firewalls won't meet cloud demands

    The term Last Generation Firewall (LGFW), Next Generation Firewall (NGFW) was coined 15 years ago. Today, with the rapid evolution of cloud technology, these LGFWs are based on architectures developed for data centers that no longer meet the security needs of cloud and multi-cloud environments.

    Here are three reasons why cloud architectures are changing the game for local government firewalls:

    1. Changing Boundaries

    The traditional concept of static boundaries no longer exists in the cloud. Cloud networks are dynamic, endless, and constantly evolving, making it difficult to defend using traditional methods.LGFW requires traffic to be redirected to a centralized point of inspection and policy enforcement, which leads to operational complexity, bottlenecks, increased latency, and costly data processing. In addition, it becomes operationally infeasible to manage a large number of dynamic ingress and egress points in the cloud using the LGFW approach.

    2. Dynamic Cloud Applications

    Cloud applications are highly dynamic, use microservice architectures and containerization, and often rely on direct Internet connections and service grid networks. These applications need to scale elastically and rely on native cloud PaaS services and API gateways, which breaks the LGFW and proxy-based security approaches in the cloud. In addition, from a policy creation perspective, security teams can no longer define policies based on IP addresses, which are constantly changing in these dynamic application environments.

    3. Infrastructure Agility Requirements

    Cloud infrastructure teams need to keep up with the agility demands of modern applications. They must adopt rapid release cycles, DevSecOps automation, and leverage the CI/CD pipelines that application teams have used for years. However, the centralized appliance operating model that originated in the data center era of local government firewalls cannot meet the agility expectations of cloud software-defined agility. Migrating LGFWs to the cloud leads to operational challenges, tool sprawl and unsustainable cost increases.

    Organizations now need cloud cybersecurity solutions designed specifically for the cloud. Distributed cloud firewalls have emerged as a promising alternative to capitalize on the distributed nature of the cloud.

    Distributed Cloud Firewall Definition

    This is the approach to firewall policy creation familiar to security professionals, but architected to take advantage of the distributed nature of the cloud. Instead of distributing firewalls across locations, this approach distributes inspection and policy enforcement into the natural application communication paths in the cloud network while maintaining centralized policy creation.

    Here are five characteristics that security professionals should look for when exploring a distributed cloud firewall approach:

    1. Distributed enforcement in local cloud traffic

    The product should embed inspection and policy enforcement into the local cloud infrastructure and natural application communication paths, eliminating the need for traffic redirection, load balancer sandwiches and other network gymnastics. This ensures scalability, eliminates bottlenecks, and enables the entire cloud network to act as a single scalable firewall.

    2. Centralized Policy Creation Across Multi-Cloud Environments
    Cloud-aware policy creation uses dynamic cloud-native application workload identities (e.g., labels and attributes) rather than static IP addresses to abstract enforcement details. Security teams can define policies through a single programmable interface while supporting inspection and policy enforcement across multiple cloud environments.

    3. Cloud Operations Model

    The product should provide complete visibility and control, support elastic auto-scaling to match application requirements, and enable programmability using industry-standard infrastructure-as-code automation tools such as Terraform. It should integrate seamlessly into the DevSecOps CI/CD pipeline.

    4. Native Cloud Networking and Security Orchestration

    The product should utilize native cloud APIs for network and security orchestration, abstracting the complexity of the underlying infrastructure. This ensures consistency between cloud service providers and prevents conflicts between network and security configurations.

    5. Advanced Security Service Integration

    A distributed cloud firewall should provide more than just basic firewall functionality. It should support micro-segmentation, network isolation, automated threat detection and mitigation, anomaly detection, vulnerability scanning, cloud workload risk scoring, L7 decryption and inspection, full traffic visibility and audit reporting. It must maintain role-based access controls to separate network and security responsibilities, all integrated into the local cloud infrastructure and operations.

    Implementing a distributed cloud firewall can deliver significant business value to organizations compared to existing LGFW implementations. Benefits include lower total cost of ownership, increased cloud infrastructure agility, improved performance, shorter mean time to detect and resolve issues, simplified enterprise and regulatory compliance, and reduced overall business risk. By adopting a cloud-native security approach, organizations can better protect their cloud environments and adapt to the dynamic nature of the cloud.

    cloud computing Security Firewall
    Previous Article NFT, from the "art" of Internet natives to the marketing tools of business
    Next Article Four advantages are highlighted, and cloud computing is the trend

    Related Articles

    CLO

    To make more environmentally friendly use of the cloud IT infrastructure, start with these aspects

    Jul 31, 2025
    CLO

    Serverless: Uncovering the benefits of the emerging cloud computing model

    Jul 03, 2025
    Encyclopedia

    What are the Wi-Fi password security levels?

    Jul 12, 2025
    Most Popular

    Business Intelligence BI Industry Knowledge - Aerospace, Satellite Internet Industry

    Jul 13, 2025

    What is AI?

    Jul 07, 2025

    What does the server mean

    Jul 24, 2025
    Copyright © 2025 itheroe.com. All rights reserved. User Agreement | Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.