Is the Firewall dead?
Is the Firewall dead? Depends on what you define as alive and well which can look quite different based on many factors, but let's not get lost in semantics, and instead consider common reoccurring attempts at transformation and maturity around adoption and progression. Full disclosure, these are my personal opinions, views, etc.
If your platform cannot support what most folks refer to as the infrastructure of yesterday (which is a large majority of organizations today) mixing up public and private data centers with a range of workload types such as virtual machines, and microservices. That's a problem.
Today, we see an accelerated adoption for Serverless Kubernetes, and with Organizations looking to Infrastructure as Code deployment as the end all be all to automating the entire puzzle and not just a piece here and there. Many of us are not yet there or even close, but it's coming. Not as quickly as I had imagined a few years ago, but nonetheless, it's prevalent today. Both are exciting and challenging because private platform providers are still very real and relevant. VMware, Microsoft Hyper-V, OpenStack, Nutanix, etc., are all very relevant and innovative with the public progression. However, heavy development on ecosystems, enterprise, and interoperability with others is a large part of the value add and proposition.
For me, early on, it was more challenging to see the big picture or immediate value, especially if you don't know what that environment looks like. Today, it's not as cloudy (no pun intended) to look back and get a sense of the "big picture". When discussing with folks who are on this journey, many with different technologies and diverse workloads, visibility, and security, are almost always the highest concerns or pain points today. How do we best support an ever-changing infrastructure by aligning the business risks and priorities? And by the way, this needs to be done easily, with little to no friction in all areas, agnostic of provider and platform. Support what is in place, requiring no changes to the individual or departmental workflows, to provide that last guardrail when a bad day happens. It will.
Minimizing the use of multiple consoles to manage and operate is another thing that pops up. Less time is needed configuring native solutions and integrations and more time to keep up with the rapid pace of our world and technology. Many times we are often sidetracked or lack the time needed to understand the latest feature to support XYZ, or the time needed to analyze the risks around exposure, security, and workflow.
Supporting the developers in securing and policing their hard work without adding additional tasks or modifying existing processes in place should also be considered. May developers and dev teams have ways they collaborate, or research local scans and findings, those results in a place they are familiar with and how to react when a problem occurs.
With that in mind, having a single cohesive landing zone dedicated to specific operations and views transparently is paramount for adoption. The next area has traditionally not been heavily involved in the normal security methodologies and flows many of us are quite used to because of many factors. Let's assume it's been friction, and extra research and work are needed because the security technology cannot integrate easily with the plethora of platforms, workloads, etc.
Before you think to give up all your other platforms or solutions for a single source of truth, this is not at all what I am implying.
When I put my developer hat on, I would never give up something that works for me let alone ask someone else to give up their favorite open-source security scanner or tester.
When I'm wearing my DevOps hat and working with the many CI platforms and Artifactories such as GitLab, Jenkins, Travis, Grafana, and Jfrog I feel many of these solutions are great tools of technology providing value and areas that excel among others.
Not to mention my repositories such as GitHub, Harbor, Tanzu, or Orchestrators, such as Portainer, Docker, Rancher, Lens, and Octant, pick your poison. Think of us as your safety net, the Security Integrator ensuring the riskiest misconfigurations or attacks get the coverage needed because they are aligned with the business risk priorities regardless of workload or platform provider. When a bad day happens (in or out) of the automatic workflow can it support legacy infrastructure handling today's workloads? Will it support many teams leading with Zero trust RBAC and segmentation?
It has to support code to cloud delivery, easily, cloud-agnostic, platform agnostic, simplified integration, onboarding, and day-to-day intuitive operations. Simply put fewer clicks, is quick to ingest with sound technology, and has a leading security track record.
Check Point CloudGuard provides a platform that delivers all of this and more. I can tell you today the firewall is very much alive and evolving at a rapid pace. If you haven't seen us in a bit, come check it out.
Summary: The firewall looks different, and, is looked at differently by many folks. Don't get caught up in semantics. Research, and do what works for you and not the latest buzz trend or tech lingo.
To find out more, click here!