Güvenlik duvarları, uzun süredir ağın ilk savunma hattı olarak kullanılmaktadır. Ağın güvenli bölümleri ile internet gibi güvenilmez harici ağlar arasında bir engel görevi görürler.
Assignment
Efficient operation of the business
The efficient operation and development of any business has long been directly linked to access to the internet. At the same time, there are quite serious security risks associated with the use of internet networks
Traffic analysis
These devices analyze traffic based on a set of rules to determine whether it can be transmitted further over the network. Modern firewalls (Next-Generation Firewalls) also support built-in Deep Packet Inspection (DPI), Intrusion Prevention Systems (IPS), and application-level traffic inspection (Web Application Firewalls)
Use Case
A firewall is installed at the boundary of the local network with the internet to protect the main computers from external attacks
A demilitarized zone is created to move all servers that require external access to a special area, isolating them from the main network
Traffic is filtered between different sections of the network
System Benefits
Protection
High-quality protection of the internal network
Minimizing attacks
Minimizing potential and possible attacks
Identification
Ensuring sufficient "visibility" of the network, identifying active applications and users
Malware
Quick detection of malicious software activities, localization and elimination of their effects, investigation of incidents