{"id":17367,"date":"2020-01-07T11:20:53","date_gmt":"2020-01-07T19:20:53","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/01\/07\/news-11103\/"},"modified":"2020-01-07T11:20:53","modified_gmt":"2020-01-07T19:20:53","slug":"news-11103","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/07\/news-11103\/","title":{"rendered":"The Achilles heel of next-gen firewalls"},"content":{"rendered":"<p><strong>Credit to Author: Sally Adam| Date: Tue, 07 Jan 2020 17:07:12 +0000<\/strong><\/p>\n<div class=\"entry-content\">\n<p>To better understand the realities of network security today, Sophos commissioned leading research specialist Vanson Bourne to conduct an independent survey of 3,100 IT managers spanning 12 countries and six continents.<\/p>\n<p>The results shed new light onto the practical reality of today\u2019s network security and the challenges IT teams face. It also reveals the Achilles heel of next-gen firewalls: the struggle to balance performance, privacy and protection.<\/p>\n<h2>Expect to find a threat on your network<\/h2>\n<p>The first takeaway from the survey is that organizations should expect to be hit by a cyberthreat. Over two-thirds (68%) of respondents fell victim to a cyberattack in the last year.<\/p>\n<p>This propensity to fall victim to a threat is not the result of a lack of protection: 91% of affected organizations were running up-to-date cybersecurity protection at the time of the attack. However, good intentions and good practices are clearly not enough: there are still holes in organizations\u2019 defenses that are enabling threats to get through.<\/p>\n<h2>Firewall enhancement wish list<\/h2>\n<p>Better threat visibility topped the list of improvements that IT managers want from their firewall, with 36% including it in their top three desired enhancements.<\/p>\n<p>The fact that visibility outranked a desire for better protection illustrates just how significant an issue lack of insight is for IT teams.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"63192\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2020\/01\/07\/the-achilles-heel-of-next-gen-firewalls\/picture-1-7\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png\" data-orig-size=\"922,504\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Picture 1\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png?w=640\" class=\"aligncenter size-full wp-image-63192\" src=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png?w=640&#038;h=350\" alt=\"\" width=\"640\" height=\"350\" srcset=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png?w=640&amp;h=350 640w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png?w=150&amp;h=82 150w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png?w=300&amp;h=164 300w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png?w=768&amp;h=420 768w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-1.png 922w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>However, firewall security isn\u2019t the only area in need of improvements, three in ten of the IT managers also wanted better performance.<\/p>\n<p>Overall, a clear picture emerged: it\u2019s no longer a question of one or the other, rather, today\u2019s IT teams require both performance and protection from their firewalls.<\/p>\n<h2>The understated risk: encrypted traffic<\/h2>\n<p>Encryption keeps network traffic private, but it doesn&#8217;t mean the contents can be trusted. In fact, encrypted traffic is a huge security risk because it renders firewalls blind to what is flowing through the network and prevents them from identifying and blocking malicious content.<\/p>\n<p>Hackers are actively exploiting encryption to enable their attacks to enter undetected. SophosLabs research has revealed that 32% of malware uses encryption.<\/p>\n<p>The level of encrypted network traffic is rising rapidly. Data from the <a href=\"https:\/\/transparencyreport.google.com\/?hl=en_GB\" rel=\"nofollow\">Google Transparency Report<\/a> indicates that over 80% of web sessions are now encrypted across all platforms, up from 60% just two years ago. However, the IT managers surveyed believed that on average only 52% of their network traffic is encrypted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"63193\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2020\/01\/07\/the-achilles-heel-of-next-gen-firewalls\/picture-2-4\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png\" data-orig-size=\"775,454\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Picture 2\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png?w=640\" class=\"aligncenter size-full wp-image-63193\" src=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png?w=640&#038;h=375\" alt=\"\" width=\"640\" height=\"375\" srcset=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png?w=640&amp;h=375 640w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png?w=150&amp;h=88 150w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png?w=300&amp;h=176 300w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png?w=768&amp;h=450 768w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-2.png 775w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>The discrepancy between perceived and actual levels of encryption together with the widespread use of encryption in cyberattacks suggests that encrypted traffic is an underestimated security risk.<\/p>\n<h2>The Achilles heel of network security<\/h2>\n<p>While 82% of survey respondents agreed that TLS inspection is necessary, only 3.5% of organizations are decrypting their traffic to properly inspect it.<\/p>\n<p>There are a number of reasons behind this: concerns about firewall performance; a lack of proper policy controls; poor user experience; and complexity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"63194\" data-permalink=\"https:\/\/news.sophos.com\/en-us\/2020\/01\/07\/the-achilles-heel-of-next-gen-firewalls\/picture-3-2\/\" data-orig-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png\" data-orig-size=\"974,393\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Picture 3\" data-image-description=\"\" data-medium-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png?w=300\" data-large-file=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png?w=640\" class=\"aligncenter size-full wp-image-63194\" src=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png?w=640&#038;h=258\" alt=\"\" width=\"640\" height=\"258\" srcset=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png?w=640&amp;h=258 640w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png?w=150&amp;h=61 150w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png?w=300&amp;h=121 300w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png?w=768&amp;h=310 768w, https:\/\/sophos.files.wordpress.com\/2020\/01\/picture-3.png 974w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p>The reality is that most organizations need to carefully balance performance, privacy and security. However, they lack the tools needed to do so effectively and efficiently. As a result, they are choosing to allow encrypted traffic to pass unchecked and putting themselves at risk from hidden network threats.<\/p>\n<p>This inability to balance performance, privacy and protection is the Achilles heel, the hidden weakness, of many next-gen firewall and UTM solutions.<\/p>\n<h2>Sophos XG Firewall: Designed for the modern encrypted internet<\/h2>\n<p>The Xstream Architecture in XG Firewall v18 offers a ground-up solution to eliminating the network traffic blind spot without impacting performance.<\/p>\n<p>It delivers:<\/p>\n<ul>\n<li><strong>High performance, <\/strong>a lightweight streaming engine with high connection capacity<\/li>\n<li><strong>Unmatched visibility<\/strong> into your encrypted traffic flows and any errors<\/li>\n<li><strong>Top security\u00a0<\/strong>that supports TLS 1.3 and all modern cipher suites with robust certificate validation<\/li>\n<li><strong>Inspection of all traffic, <\/strong>being application and port agnostic<\/li>\n<li><strong>A great user experience<\/strong> with extensive interoperability to avoid breaking the internet<\/li>\n<li><strong>Powerful policy tools<\/strong> that offer the perfect balance of performance, privacy and protection<\/li>\n<\/ul>\n<p>The new Xstream SSL Inspection engine will be available to all XG Firewall customers at no extra charge. Try it now as part of the <a href=\"https:\/\/community.sophos.com\/products\/xg-firewall\/sfos-eap\/sfos-v18-early-access-program\/?cmp=26058\">early access program<\/a>.<\/p>\n<p>To learn more about Sophos XG Firewall and see it in action, <a href=\"https:\/\/www.sophos.com\/en-us\/products\/next-gen-firewall.aspx?cmp=26058\">visit the web page<\/a> or start an <a href=\"https:\/\/secure2.sophos.com\/en-us\/products\/next-gen-firewall\/free-trial\/xg-firewall-demo.aspx?cmp=26058\">instant online demo<\/a>.<\/p>\n<p><a href=\"https:\/\/secure2.sophos.com\/en-us\/security-news-trends\/whitepapers\/gated-wp\/next-gen-firewall-achilles-heel.aspx?cmp=26058\">Download a PDF copy of the report<\/a> to get the full survey results.<\/p>\n<\/p><\/div>\n<p><a href=\"http:\/\/feedproxy.google.com\/~r\/sophos\/dgdY\/~3\/n13iBVJ2T5A\/\" target=\"bwo\" >http:\/\/feeds.feedburner.com\/sophos\/dgdY<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/sophos.files.wordpress.com\/2020\/01\/shutterstock_12717889181.png\"\/><\/p>\n<p><strong>Credit to Author: Sally Adam| Date: Tue, 07 Jan 2020 17:07:12 +0000<\/strong><\/p>\n<p>We&#8217;re shedding light on network security&#8217;s downfall &#8211; the struggle to balance performance, privacy and protection.&lt;img src=&#8221;http:\/\/feeds.feedburner.com\/~r\/sophos\/dgdY\/~4\/n13iBVJ2T5A&#8221; height=&#8221;1&#8243; width=&#8221;1&#8243; alt=&#8221;&#8221;\/&gt;<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10378,10377],"tags":[10379,10439,10384,10409,23124],"class_list":["post-17367","post","type-post","status-publish","format-standard","hentry","category-security","category-sophos","tag-corporate","tag-encryption","tag-network","tag-xg-firewall","tag-xg-firewall-v18"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17367"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17367\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17367"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}