Hello, I'm security defender PR.
We have unified the basic functions and terminology of firewalls through Part 1 Firewall (UTM).
I hope you watch the first episode.
Where are your important data? Not the USB.
We're security defender. You're on your office NAS?
You have a DB server in IDC and you're going to duplicate it with backup?
And now you use clouds like Amazon, MS, and KT?
This critical information data is moving naturally with the flow.
Many network security devices are deployed, including UTM, IPS, web firewalls, and Anti-DDoS, to keep data safe.
The target could be an external attacker or an internal user.
It's meaningful that data should be protected as a three-factor security, integrity, and availability.
There are some differences in how we evolve from a perspective, but today we're going to talk about moving data around the basis of movement.
Based on your target, we'll take a look at the Zero-Day Attack (a technical threat to attack a vulnerability in computer software, an attack that occurs at a time when no patch has been found) for internal users, but it's going to be longer today, so we'll take a look at it next time.
I compared firewalls 1 to the castle gate. Do you agree?
We should build castles based on important data and close the gates, right?
How? I think proper is a very difficult word.
If you look at it the opposite way, not too much or not too short, a good, high-salary security defender seems to be doing it "appropriate."
Maybe I'm still trying to do this right.
Don't be sentimental, go back to the topic, and what will happen to the firewall in the near future?
I think that in 10 years, the firewall will be gone. No...
I'm afraid I'm going to have to...
Twenty years ago, security experts said that firewalls would be gone, but network firewalls kept their primary defenses silent while new security threats continued to emerge. Evolving into a next-generation firewall, the device provides user-specific access and blocking functions by identifying application control and user-specific account information, and adds the sensor box function, executes abnormal patterns in advance in the sensor box virtual space and delivers only safe packets to internal users.
Recently, it has served as a security service platform (firewall+sendbox+cloud+SDNFV) that integrates diverse threat information in the cloud environment into one, not just access control.
Let me put my thoughts in three ways.
First! The evolution of the cloud environment will eliminate the hardware of places where data is composed in a concentrated form, such as IDC.
As in the current configuration, firewall, IPS, web firewall, and Anti-DDoS are not independent equipment, but NFV platform to handle all security features and protect them, so you can run them in one click with the app.
Second! Security equipment hardware will disappear with advances in the technology of the block chain.
Once again, as we compare the firewall to the castle gate, there should be data in the castle that we want to protect.
But there's no data in the castle...
Blockchain technology can do that.
If distributed data technologies can ensure the confidentiality, integrity, and availability of data, I don't think there's a need to manage firewalls at every entrance.
Third! The Legacy Firewall will last forever. Forever~
Access control features such as offices, PCs, laptops, and mobile devices will remain the same for the next 25 years or more.
댓글